Sciweavers

20294 search results - page 3973 / 4059
» Algorithmic Information Theory
Sort
View
CCS
2004
ACM
15 years 10 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
EUROCRYPT
2004
Springer
15 years 10 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
ICCS
2004
Springer
15 years 10 months ago
Petri Nets as Executable Specifications of High-Level Timed Parallel Systems
We propose to use high-level Petri nets as a model for the semantics of high-level parallel systems. This model is known to be useful for the purpose of verification and we show t...
Franck Pommereau
151
Voted
ICMI
2004
Springer
179views Biometrics» more  ICMI 2004»
15 years 10 months ago
Visual touchpad: a two-handed gestural input device
This paper presents the Visual Touchpad, a low-cost vision-based input device that allows for fluid two-handed interactions with desktop PCs, laptops, public kiosks, or large wall...
Shahzad Malik, Joseph Laszlo
KDD
2004
ACM
198views Data Mining» more  KDD 2004»
15 years 10 months ago
Mining traffic data from probe-car system for travel time prediction
We are developing a technique to predict travel time of a vehicle for an objective road section, based on real time traffic data collected through a probe-car system. In the area ...
Takayuki Nakata, Jun-ichi Takeuchi
« Prev « First page 3973 / 4059 Last » Next »