Sciweavers

2205 search results - page 270 / 441
» Mutation Operators for Specifications
Sort
View
USS
2010
15 years 1 months ago
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation
Many applications of IP geolocation can benefit from geolocation that is robust to adversarial clients. These include applications that limit access to online content to a specifi...
Phillipa Gill, Yashar Ganjali, Bernard Wong, David...
PAMI
2011
14 years 10 months ago
Multiperson Visual Focus of Attention from Head Pose and Meeting Contextual Cues
—This paper introduces a novel contextual model for the recognition of people’s visual focus of attention (VFOA) in meetings from audio-visual perceptual cues. More specificall...
Sileye O. Ba, Jean-Marc Odobez
FI
2010
143views more  FI 2010»
14 years 10 months ago
Implementing Value Added Applications in Next Generation Networks
: One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs) are also telec...
Yeh-Chin Ho, Yi-Bing Lin, Ren-Huang Liou, Yuan-Kua...
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 10 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
CDC
2010
IEEE
110views Control Systems» more  CDC 2010»
14 years 10 months ago
Synthesis of embedded control systems with high sampling frequencies
Motivated by current technological advances in the design of real-time embedded systems, this work deals with the digital control of a continuous-time linear time-invariant (LTI) s...
Javad Lavaei, Somayeh Sojoudi, Richard M. Murray