Sciweavers

3557 search results - page 655 / 712
» Authoring Presentation for OpenMath
Sort
View
132
Voted
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
15 years 7 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...
92
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Ultrasonic Doppler sensor for speaker recognition
In this paper we present a novel use of an acoustic Doppler sonar for multi-modal speaker identification. An ultrasonic emitter directs a 40kHz tone toward the speaker. Reflecti...
Kaustubh Kalgaonkar, Bhiksha Raj
NDSS
2008
IEEE
15 years 7 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
113
Voted
NDSS
2008
IEEE
15 years 7 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 7 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...