Sciweavers

1753 search results - page 260 / 351
» State Machines
Sort
View
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Mining Information of Attack-Defense Status from Soccer Video Based on Scene Analysis
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection, structure an...
Shuqiang Jiang, Qingming Huang, Wen Gao
ICNP
2007
IEEE
15 years 4 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
106
Voted
LICS
2007
IEEE
15 years 4 months ago
First-Order and Temporal Logics for Nested Words
Nested words are a structured model of execution paths in procedural programs, reflecting their call and return nesting structure. Finite nested words also capture the structure ...
Rajeev Alur, Marcelo Arenas, Pablo Barceló,...
NCA
2007
IEEE
15 years 4 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...
SECON
2007
IEEE
15 years 4 months ago
High-Level Application Development is Realistic for Wireless Sensor Networks
—Programming Wireless Sensor Network (WSN) applications is known to be a difficult task. Part of the problem is that the resource limitations of typical WSN nodes force programm...
Marcin Karpinski, Vinny Cahill