Sciweavers

45 search results - page 8 / 9
» How to Foresee and Capture the Effects of RFID Implementatio...
Sort
View
CHI
2011
ACM
12 years 9 months ago
Creek watch: pairing usefulness and usability for successful citizen science
Citizen science projects can collect a wealth of scientific data, but that data is only helpful if it is actually used. While previous citizen science research has mostly focused ...
Sunyoung Kim, Christine Robson, Thomas Zimmerman, ...
CSFW
2003
IEEE
13 years 11 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
WINE
2009
Springer
199views Economy» more  WINE 2009»
14 years 10 days ago
Externalities in Keyword Auctions: An Empirical and Theoretical Assessment
It is widely believed that the value of acquiring a slot in a sponsored search list (that comes along with the organic links in a search engine’s result page) highly depends on ...
Renato Gomes, Nicole Immorlica, Evangelos Markakis
CVPR
2009
IEEE
1626views Computer Vision» more  CVPR 2009»
15 years 22 days ago
Coded Exposure Deblurring: Optimized Codes for PSF Estimation and Invertibility
We consider the problem of single image object motion deblurring from a static camera. It is well known that deblurring of moving objects using a traditional camera is ill-posed, d...
Amit K. Agrawal, Yi Xu
NDSS
2008
IEEE
14 years 4 days ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...