Sciweavers

1990 search results - page 310 / 398
» Conceptual User Tracking
Sort
View
140
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
ADHOCNOW
2006
Springer
15 years 10 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel
ACMACE
2006
ACM
15 years 10 months ago
Interaction techniques for musical performance with tabletop tangible interfaces
We present a set of interaction techniques for electronic musical performance using a tabletop tangible interface. Our system, the Audiopad, tracks the positions of objects on a t...
James Patten, Ben Recht, Hiroshi Ishii
ASPLOS
2006
ACM
15 years 10 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
148
Voted
GRAPHITE
2006
ACM
15 years 10 months ago
Camera textures
In this paper we introduce a novel real-time rendering technique for camera deformations that can be applied to lens distortions and non-realistic projections. Our technique is ba...
Martin Spindler, Marco Bubke, Tobias Germer, Thoma...