Sciweavers

5684 search results - page 994 / 1137
» Computing with active dendrites
Sort
View
CCS
2011
ACM
14 years 4 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...
ECOOP
2011
Springer
14 years 4 months ago
An Empirical Study of Object Protocols in the Wild
Abstract. An active area of research in computer science is the prevention of violations of object protocols, i.e., restrictions on temporal orderings of method calls on an object....
Nels E. Beckman, Duri Kim, Jonathan Aldrich

Publication
164views
14 years 3 months ago
A Statistical Overlap Prior for Variational Image Segmentation
This study investigates variational image segmentation with an original data term, referred to as statistical overlap prior, which measures the conformity of overlap between the no...
Ismail Ben Ayed, Shuo Li and Ian Ross
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 5 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
CHI
2007
ACM
16 years 4 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...