Sciweavers

26071 search results - page 5083 / 5215
» Making the
Sort
View
118
Voted
USS
2010
14 years 10 months ago
Chipping Away at Censorship Firewalls with User-Generated Content
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
147
Voted
USS
2010
14 years 10 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
124
Voted
VRST
2010
ACM
14 years 10 months ago
Augmentation techniques for efficient exploration in head-mounted display environments
Physical characteristics and constraints of today's head-mounted displays (HMDs) often impair interaction in immersive virtual environments (VEs). For instance, due to the li...
Benjamin Bolte, Gerd Bruder, Frank Steinicke, Klau...
120
Voted
VTC
2010
IEEE
195views Communications» more  VTC 2010»
14 years 10 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
138
Voted
VTC
2010
IEEE
167views Communications» more  VTC 2010»
14 years 10 months ago
The Impact of Fading on the Outage Probability in Cognitive Radio Networks
Abstract--This paper analyzes the outage probability in cognitive radio networks, based on the Poisson point process model of node spatial distribution and the standard propagation...
Yaobin Wen, Sergey Loyka, Abbas Yongaçoglu
« Prev « First page 5083 / 5215 Last » Next »