Sciweavers

17 search results - page 2 / 4
» But Who Will Guard the Guardians
Sort
View
DBSEC
2008
129views Database» more  DBSEC 2008»
13 years 6 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
PET
2007
Springer
13 years 11 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
POPL
2009
ACM
14 years 5 months ago
Static contract checking for Haskell
Program errors are hard to detect and are costly both to programmers who spend significant efforts in debugging, and for systems that are guarded by runtime checks. Static verific...
Dana N. Xu, Simon L. Peyton Jones, Koen Claessen
ICASSP
2009
IEEE
13 years 12 months ago
Wildfire detection using LMS based active learning
A computer vision based algorithm for wildfire detection is developed. The main detection algorithm is composed of four sub-algorithms detecting (i) slow moving objects, (ii) gra...
B. Ugur Töreyin, A. Enis Çetin
IROS
2006
IEEE
106views Robotics» more  IROS 2006»
13 years 11 months ago
Where to Build a Door
— A room is a simple polygon with a prespecified point, called the door, on its boundary. Search starts at the door, and must detect any intruder that may be in the room, while ...
John Z. Zhang, Tsunehiko Kameda