Sciweavers

87 search results - page 17 / 18
» Publicly Detectable Techniques for the Protection of Virtual...
Sort
View
DIMVA
2008
13 years 7 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
ICMI
2004
Springer
179views Biometrics» more  ICMI 2004»
13 years 11 months ago
Visual touchpad: a two-handed gestural input device
This paper presents the Visual Touchpad, a low-cost vision-based input device that allows for fluid two-handed interactions with desktop PCs, laptops, public kiosks, or large wall...
Shahzad Malik, Joseph Laszlo
SASN
2004
ACM
13 years 11 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
ISER
1997
Springer
202views Robotics» more  ISER 1997»
13 years 10 months ago
Interactive Visual and Force Rendering of Human-Knee Dynamics
The kinematics and force/displacement relationships of elements of biological joints are notoriously difficult to understand. In particular, the human knee has bearing surfaces o...
Randy E. Ellis, P. Zion, C. Y. Tso
ICTAC
2010
Springer
13 years 4 months ago
Scalable Distributed Concolic Testing: A Case Study on a Flash Storage Platform
Flash memory has become a virtually indispensable component for mobile devices in today’s information society. However, conventional testing methods often fail to detect hidden b...
Yunho Kim, Moonzoo Kim, Nam Dang