—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
We present a framework for building fail-safe hard real-time applications in timed asynchronous distributed systems subject to communication partitions and performance, omission, ...
We present a table tennis game concept, implemented for Symbian OS/Series 60 mobile phones, using the phone's integrated camera as the main game controller. The game demonstr...
Abstract. In this paper, we propose a new approach to learn structured visual compound models from shape-based feature descriptions. We use captioned text in order to drive the pro...
Jan Moringen, Sven Wachsmuth, Sven J. Dickinson, S...