Sciweavers

1228 search results - page 234 / 246
» Manipulation of Pose Distributions
Sort
View
WS
2005
ACM
15 years 3 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
ICS
2005
Tsinghua U.
15 years 3 months ago
A performance-conserving approach for reducing peak power consumption in server systems
The combination of increasing component power consumption, a desire for denser systems, and the required performance growth in the face of technology-scaling issues are posing eno...
Wesley M. Felter, Karthick Rajamani, Tom W. Keller...
94
Voted
MIDDLEWARE
2005
Springer
15 years 3 months ago
An aspect-oriented ambient intelligence middleware platform
Currently, the interest in Ambient Intelligence (or AmI) has increased exponentially due to the widespread use of portable devices. Users demand more and more functionality from t...
Lidia Fuentes, Daniel Jiménez
55
Voted
VLDB
2005
ACM
103views Database» more  VLDB 2005»
15 years 2 months ago
Mapping Maintenance for Data Integration Systems
To answer user queries, a data integration system employs a set of semantic mappings between the mediated schema and the schemas of data sources. In dynamic environments sources o...
Robert McCann, Bedoor K. AlShebli, Quoc Le, Hoa Ng...
102
Voted
CCS
2005
ACM
15 years 2 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar