Sciweavers

1805 search results - page 265 / 361
» Understanding Code Mobility
Sort
View
SASN
2003
ACM
15 years 4 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
ACSAC
2004
IEEE
15 years 3 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney

Lecture Notes
4961views
16 years 9 months ago
The Relational Data Model, Normalisation and effective Database Design
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
Tony Marston
CVPR
2006
IEEE
16 years 1 months ago
3D Facial Expression Recognition Based on Primitive Surface Feature Distribution
The creation of facial range models by 3D imaging systems has led to extensive work on 3D face recognition [19]. However, little work has been done to study the usefulness of such...
Jun Wang, Lijun Yin, Xiaozhou Wei, Yi Sun
CHI
2009
ACM
15 years 12 months ago
SiteLens: situated visualization techniques for urban site visits
Urban designers and urban planners often conduct site visits prior to a design activity to search for patterns or better understand existing conditions. We introduce SiteLens, an ...
Sean White, Steven Feiner