Sciweavers

141 search results - page 28 / 29
» Application of Vulnerability Discovery Models to Major Opera...
Sort
View
IEEEARES
2007
IEEE
13 years 11 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
IROS
2006
IEEE
151views Robotics» more  IROS 2006»
13 years 11 months ago
Robust Feature Correspondences for Vision-Based Navigation with Slow Frame-Rate Cameras
— We propose a vision-based inertial system that overcomes the problems associated with slow update rates in navigation systems based on high-resolution cameras. Due to bandwidth...
Darius Burschka
TIP
1998
240views more  TIP 1998»
13 years 5 months ago
DCT-based motion estimation
—We propose novel discrete cosine transform (DCT) pseudophase techniques to estimate shift/delay between two onedimensional (1-D) signals directly from their DCT coefficients by...
Ut-Va Koc, K. J. Ray Liu
NSPW
2003
ACM
13 years 10 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
OTM
2007
Springer
13 years 11 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...