Sciweavers

13717 search results - page 2638 / 2744
» Control Systems
Sort
View
CONEXT
2009
ACM
14 years 7 months ago
Lockr: better privacy for social networks
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...
CODES
2010
IEEE
14 years 7 months ago
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
This paper describes PowerBooter, an automated power model construction technique that uses built-in battery voltage sensors and knowledge of battery discharge behavior to monitor...
Lide Zhang, Birjodh Tiwana, Zhiyun Qian, Zhaoguang...
CORR
2010
Springer
257views Education» more  CORR 2010»
14 years 7 months ago
Survey on Various Gesture Recognition Techniques for Interfacing Machines Based on Ambient Intelligence
Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The main goal of gesture recognition is to create a system which can recognize specific hu...
Harshith C, Karthik R. Shastry, Manoj Ravindran, M...
DEBU
2010
152views more  DEBU 2010»
14 years 7 months ago
Implementing an Append-Only Interface for Semiconductor Storage
Solid-state disks are currently based on NAND flash and expose a standard disk interface. To accommodate limitations of the medium, solid-state disk implementations avoid rewritin...
Colin W. Reid, Philip A. Bernstein
ACSAC
2010
IEEE
14 years 6 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
« Prev « First page 2638 / 2744 Last » Next »