Sciweavers

5326 search results - page 1031 / 1066
» On what we can ensure
Sort
View
116
Voted
SASN
2006
ACM
15 years 6 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
DIGRA
2005
Springer
15 years 6 months ago
Shadowplay: Simulated Illumination in Game Worlds
Despite the fact that there are currently a number of enjoyable digital games in which light plays a key role, we lack a vocabulary with which to discuss simulated illumination in...
Simon Niedenthal
MSWIM
2004
ACM
15 years 6 months ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl
MIS
2004
Springer
162views Multimedia» more  MIS 2004»
15 years 6 months ago
Integrating the Results of Multimedia Sub-Queries Using Qualitative Preferences
When similarity queries over multimedia databases are processed by splitting the overall query condition into a set of sub-queries, the problem of how to efficiently and effectiv...
Ilaria Bartolini, Paolo Ciaccia, Vincent Oria, M. ...
ISCA
2002
IEEE
68views Hardware» more  ISCA 2002»
15 years 5 months ago
Timekeeping in the Memory System: Predicting and Optimizing Memory Behavior
Techniques for analyzing and improving memory referencing behavior continue to be important for achieving good overall program performance due to the ever-increasing performance g...
Zhigang Hu, Margaret Martonosi, Stefanos Kaxiras
« Prev « First page 1031 / 1066 Last » Next »