Sciweavers

4887 search results - page 664 / 978
» System Level Design Using C
Sort
View
156
Voted
CCS
2009
ACM
15 years 11 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
133
Voted
ICIP
2003
IEEE
16 years 6 months ago
Image features that draw fixations
The ability to automatically detect `visually interesting' regions in an image has many practical applications especially in the design of active machine vision systems. This...
Umesh Rajashekar, Lawrence K. Cormack, Alan C. Bov...
DAC
2009
ACM
16 years 5 months ago
Thermal-aware data flow analysis
This paper suggests that the thermal state of a processor can be approximated using data flow analysis. The results of this analysis can be used to evaluate the efficacy of therma...
David Atienza, José Luis Ayala, Philip Bris...
CHI
2004
ACM
16 years 5 months ago
Technology: a means for enhancing the independence and connectivity of older people
The focus of this panel will be on aging and technology. The intent is to demonstrate how technology can be used to help older adults remain independent, productive and connected ...
Herman Bouma, Sara J. Czaja, Hiroyuki Umemuro, Wen...
133
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
Practical declarative network management
We present Flow-based Management Language (FML), a declarative policy language for managing the configuration of enterprise networks. FML was designed to replace the many dispara...
Timothy L. Hinrichs, Natasha Gude, Martin Casado, ...