Sciweavers

3971 search results - page 664 / 795
» On the Use of Properties in Java Applications
Sort
View
LCN
2005
IEEE
15 years 10 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
134
Voted
SRDS
2005
IEEE
15 years 10 months ago
Distributed Construction of a Fault-Tolerant Network from a Tree
We present an algorithm by which nodes arranged in a tree, with each node initially knowing only its parent and children, can construct a fault-tolerant communication structure (a...
Michael K. Reiter, Asad Samar, Chenxi Wang
WACV
2005
IEEE
15 years 10 months ago
Measures of Similarity
Quantitative evaluation and comparison of image segmentation algorithms is now feasible owing to the recent availability of collections of hand-labeled images. However, little att...
Ranjith Unnikrishnan, Martial Hebert
129
Voted
HASKELL
2005
ACM
15 years 10 months ago
Visual haskell: a full-featured haskell development environment
We describe the design and implementation of a full-featured Haskell development environment, based on Microsoft’s extensible Visual Studio environment. Visual Haskell provides ...
Krasimir Angelov, Simon Marlow
136
Voted
SENSYS
2005
ACM
15 years 10 months ago
Algorithms for generic role assignment in wireless sensor networks
We consider configuration of wireless sensor networks, where certain functions must be automatically assigned to sensor nodes, such that the properties of a sensor node (e.g., rem...
Christian Frank, Kay Römer