Sciweavers

400 search results - page 56 / 80
» Simulation within the railroad environment
Sort
View

Publication
145views
14 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
CHI
2004
ACM
15 years 10 months ago
Transcendent communication: location-based guidance for large-scale public spaces
Many studies have been conducted on supporting communication in home and office spaces, but relatively few studies have explored supporting communication in large-scale public spa...
Hideyuki Nakanishi, Satoshi Koizumi, Toru Ishida, ...
ISMAR
2005
IEEE
15 years 3 months ago
Camera-Marker Alignment Framework and Comparison with Hand-Eye Calibration for Augmented Reality Applications
An integral part of every augmented reality system is the calibration between camera and camera-mounted tracking markers. Accuracy and robustness of the AR overlay process is grea...
Gérald Bianchi, Christian Wengert, Matthias...
MVA
1998
118views Computer Vision» more  MVA 1998»
14 years 11 months ago
Integrated Vision/Control System for Autonomous Planetary Rovers
Current NASA plans call for extended year-long, multikilometer treks for the 2003 and 2005 Mars missions. A much greater amount of rover autonomy is required compared to the recen...
Terry Huntsberger, Toshiro Kubota, John Rose
SPRINGSIM
2007
14 years 11 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter