Sciweavers

4987 search results - page 303 / 998
» Fuzzifying P Systems
Sort
View
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 4 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
MMM
2012
Springer
320views Multimedia» more  MMM 2012»
14 years 8 days ago
Annotated Free-Hand Sketches for Video Retrieval Using Object Semantics and Motion
Abstract. We present a novel video retrieval system that accepts annotated freehand sketches as queries. Existing sketch based video retrieval (SBVR) systems enable the appearance ...
Rui Hu, Stuart James, John P. Collomosse
134
Voted
DAC
2012
ACM
13 years 7 months ago
Self-aware computing in the Angstrom processor
Addressing the challenges of extreme scale computing requires holistic design of new programming models and systems that support those models. This paper discusses the Angstrom pr...
Henry Hoffmann, Jim Holt, George Kurian, Eric Lau,...
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
15 years 10 months ago
Free Riding: A New Challenge to Peer-to-Peer File Sharing Systems
Most of the research in the field of peer-to-peer file sharing systems has concentrated on performance issues such as efficient file lookup, replicating files to improve fil...
Lakshmish Ramaswamy, Ling Liu
CAV
2009
Springer
239views Hardware» more  CAV 2009»
15 years 8 months ago
MCMAS: A Model Checker for the Verification of Multi-Agent Systems
tic modalities for correctness [16]. The release described in this abstract is a complete rebuild of a preliminary experimental checker [14]. The model input language includes vari...
Alessio Lomuscio, Hongyang Qu, Franco Raimondi