Sciweavers

5275 search results - page 934 / 1055
» Computing by observing
Sort
View
159
Voted
DSN
2003
IEEE
15 years 8 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
108
Voted
ICCV
2003
IEEE
15 years 8 months ago
What Does Motion Reveal About Transparency?
The perception of transparent objects from images is known to be a very hard problem in vision. Given a single image, it is difficult to even detect the presence of transparent o...
Moshe Ben-Ezra, Shree K. Nayar
109
Voted
ICDCS
2003
IEEE
15 years 8 months ago
Protecting BGP Routes to Top Level DNS Servers
—The Domain Name System (DNS) is an essential part of the Internet infrastructure and provides fundamental services, such as translating host names into IP addresses for Internet...
Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Dan...
116
Voted
ICDCSW
2003
IEEE
15 years 8 months ago
CATP: A Context-Aware Transportation Protocol for HTTP
— The rendering mechanism used in Web browsers have a significant impact on the user behavior and delay tolerance of retrieval. The head-of-line blocking phenomena prevents the ...
Huamin Chen, Prasant Mohapatra
152
Voted
COMPGEOM
2003
ACM
15 years 8 months ago
Cost-driven octree construction schemes: an experimental study
Given a scene consisting of objects, ray shooting queries answer with the first object encountered by a given ray, and are used in ray tracing and radiosity for rendering photo-r...
Boris Aronov, Hervé Brönnimann, Allen ...