Sciweavers

4650 search results - page 672 / 930
» Generating and evaluating evaluative arguments
Sort
View
MOBICOM
2004
ACM
15 years 10 months ago
Modeling mobility for vehicular ad-hoc networks
Without realistic modeling of node mobility, simulation evaluation of performance of mobile ad hoc networks may not correlate well with performance in a real deployment. In this p...
Amit Kumar Saha, David B. Johnson
SAC
2004
ACM
15 years 10 months ago
Towards multisensor data fusion for DoS detection
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Christos Siaterlis, Basil S. Maglaris
VRST
2004
ACM
15 years 10 months ago
Modeling and rendering of walkthrough environments with panoramic images
An important, potential application of image-based techniques is to create photo-realistic image-based environments for interactive walkthrough. However, existing image-based stud...
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 10 months ago
Improving the Security of Dual-Rail Circuits
Dual-rail encoding, return-to-spacer protocol and hazard-free logic can be used to resist differential power analysis attacks by making the power consumption independent of process...
Danil Sokolov, Julian Murphy, Alexandre V. Bystrov...
CSCLP
2004
Springer
15 years 10 months ago
Automatically Exploiting Symmetries in Constraint Programming
We introduce a framework for studying and solving a class of CSP formulations. The framework allows constraints to be expressed as linear and nonlinear equations, then compiles th...
Arathi Ramani, Igor L. Markov