Sciweavers

12183 search results - page 157 / 2437
» Computers under Attacks!
Sort
View
SOUPS
2006
ACM
15 years 11 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
ICPR
2008
IEEE
16 years 6 months ago
People and luggage recognition in airport surveillance under real-time constraints
This paper describes an approach to classify people, groups of people and luggage in the halls of an airport. The algorithm is included into a surveillance system which tracks and...
Vicente Luis Atienza Vanacloig, Juan Alfonso Rosel...
JSSPP
2001
Springer
15 years 9 months ago
Coscheduling under Memory Constraints in a NOW Environment
Networks of Workstations (NOW) have become important and cost-effective parallel platforms for scientific computations. In practice, a NOW system is heterogeneous and non-dedicat...
Francesc Giné, Francesc Solsona, Porfidio H...
APPROX
2008
Springer
88views Algorithms» more  APPROX 2008»
15 years 7 months ago
Limitations of Hardness vs. Randomness under Uniform Reductions
We consider (uniform) reductions from computing a function f to the task of distinguishing the output of some pseudorandom generator G from uniform. Impagliazzo and Wigderson [IW]...
Dan Gutfreund, Salil P. Vadhan
NLUCS
2008
15 years 6 months ago
The Role of Attention in Understanding Spatial Expressions under the Distractor Condition
Abstract. To develop a computational model of understanding spatial expressions, various factors should be taken into account. We have been exploring the relations between the good...
Tatsumi Kobayashi, Asuka Terai, Takenobu Tokunaga