Sciweavers

558 search results - page 77 / 112
» Safe and Effective Determinant Evaluation
Sort
View
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 5 months ago
A Preliminary Model for Generating Experience Knowledge Based Artifacts
Inspections provide an effective way of acquiring and reusing experience knowledge. Several details, in both the inspection processes and the inspection event itself, can be found...
Jouni Kokkoniemi
INFOCOM
2006
IEEE
15 years 5 months ago
A Joint Design of Distributed QoS Scheduling and Power Control for Wireless Networks
— The capacity of a power controlled wireless network can be changing due to user’s mobility, fading or shadowing effects. As a result, the quality of service (QOS) of users ac...
Chun-Chia Chen, Duan-Shin Lee
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
15 years 5 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
NETGAMES
2006
ACM
15 years 5 months ago
Count down protocol: asynchronous consistent protocol in P2P virtual ball game
This paper studies a way to improve consistency of states in a ball game typed DVE with lag, in P2P architecture. We also study how to control shared objects in real-time in a ser...
Yoshihiro Kawano, Tatsuhiro Yonekura
3DIM
2005
IEEE
15 years 5 months ago
Globally Convergent Range Image Registration by Graph Kernel Algorithm
Automatic range image registration without any knowledge of the viewpoint requires identification of common regions across different range images and then establishing point corr...
Radim Sára, Ikuko Shimizu Okatani, Akihiro ...