Sciweavers

3103 search results - page 334 / 621
» Locating Features in Distributed Systems
Sort
View
IFIP
2007
Springer
15 years 11 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
ISORC
2006
IEEE
15 years 10 months ago
JAAT: Java Alias Analysis Tool for Program Maintenance Activities
Alias analysis is a method for extracting sets of expressions which may possibly refer to the same memory locations during program execution. Although many researchers have alread...
Fumiaki Ohata, Katsuro Inoue
ETRA
2006
ACM
136views Biometrics» more  ETRA 2006»
15 years 10 months ago
Computational mechanisms for gaze direction in interactive visual environments
Next-generation immersive virtual environments and video games will require virtual agents with human-like visual attention and gaze behaviors. A critical step is to devise effic...
Robert J. Peters, Laurent Itti
WACV
2005
IEEE
15 years 10 months ago
Automated Microaneurysm Segmentation and Detection using Generalized Eigenvectors
Diabetic retinopathy is a major cause of blindness and microaneurysms are the first clinically observable manifestations of diabetic retinopathy. Regular screening and timely int...
P. M. D. S. Pallawala, Wynne Hsu, Mong-Li Lee, Say...
ICDCSW
2003
IEEE
15 years 10 months ago
Service Discovery and Name Resolution Architectures for On-Demand MANETs
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). In this paper, we propose a mechanism for...
Paal Engelstad, Yan Zheng, Tore E. Jønvik, ...