Sciweavers

1245 search results - page 246 / 249
» Topology generation based on network design heuristics
Sort
View
109
Voted
COMCOM
2011
14 years 6 months ago
Volume-aware positioning in the context of a marine port terminal
The rapid proliferation of mobile computing devices and local wireless networks over the past few years has promoted a continuously growing interest in location-aware systems and ...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
92
Voted
CSCW
2008
ACM
15 years 1 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
14 years 6 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
ACSAC
2008
IEEE
15 years 1 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
CVPR
2006
IEEE
16 years 1 months ago
Object Pose Detection in Range Scan Data
We address the problem of detecting complex articulated objects and their pose in 3D range scan data. This task is very difficult when the orientation of the object is unknown, an...
Jim Rodgers, Dragomir Anguelov, Hoi-Cheung Pang, D...