Sciweavers

1705 search results - page 268 / 341
» Representing Constraints with Automata
Sort
View
120
Voted
SASN
2003
ACM
15 years 6 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
95
Voted
SIGGRAPH
2003
ACM
15 years 6 months ago
A social metaphor-based 3D virtual environment
Our design goal for OnLive Traveler was to develop a virtual community system that emulates natural social paradigms, allowing the participants to sense a tele-presence, the subje...
Steve DiPaola, David Collins
120
Voted
CCS
2003
ACM
15 years 6 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
84
Voted
IBPRIA
2003
Springer
15 years 6 months ago
Regularization of 3D Cylindrical Surfaces
In this paper we present a method for the regularization of 3D cylindrical surfaces. By a cylindrical surface we mean a 3D surface that can be expressed as an application S(l, θ) ...
Luis Álvarez, Carmelo Cuenca, Javier S&aacu...
116
Voted
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
15 years 5 months ago
A Smart Space application to dynamically relate medical and environmental information
— In this paper we present a cross-domain application for ambient and health monitoring. The system architecture is intended to be openly extensible in order to fulfil unanticipa...
Fabio Vergari, Sara Bartolini, Federico Spadini, A...