Sciweavers

12487 search results - page 2386 / 2498
» Graspable Work Modeling
Sort
View
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
15 years 9 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
VISUALIZATION
2005
IEEE
15 years 9 months ago
Streaming Meshes
Recent years have seen an immense increase in the complexity of geometric data sets. Today’s gigabyte-sized polygon models can no longer be completely loaded into the main memor...
Martin Isenburg, Peter Lindstrom
VISUALIZATION
2005
IEEE
15 years 9 months ago
Visualizing intersecting surfaces with nested-surface techniques
This paper describes the adaptation and evaluation of existing nestedsurface visualization techniques for the problem of displaying intersecting surfaces. For this work, we collab...
Chris Weigle, Russell M. Taylor II
WISE
2005
Springer
15 years 9 months ago
A Web Recommendation Technique Based on Probabilistic Latent Semantic Analysis
Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of clickstream data will lead to capture usag...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
AOSD
2005
ACM
15 years 9 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
« Prev « First page 2386 / 2498 Last » Next »