Sciweavers

4076 search results - page 742 / 816
» A framework for developing distributed location based applic...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
VISUALIZATION
1997
IEEE
15 years 2 months ago
Volume rendering of abdominal aortic aneurysms
Volume rendering is a valuable and important technique for scientific visualization. One well known application area is the reconstruction and visualization of output from medica...
Roger C. Tam, Christopher G. Healey, Borys Flak, P...
AAAI
2008
15 years 4 days ago
Unstructured Audio Classification for Environment Recognition
My thesis aims to contribute towards building autonomous agents that are able to understand their surrounding environment through the use of both audio and visual information. To ...
Selina Chu
BIOCOMP
2007
14 years 11 months ago
xMAN: extreme MApping of oligoNucleotides
Background: The ability to rapidly map millions of oligonucleotide fragments to a reference genome is crucial to many high throughput genomic technologies. Results: We propose an ...
Wei Li, Jason S. Carroll, Myles Brown, X. Shirley ...
ESORICS
2010
Springer
14 years 11 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik