Sciweavers

1518 search results - page 210 / 304
» Cryptographic Test Correction
Sort
View
131
Voted
ICSM
2008
IEEE
15 years 7 months ago
Change impact analysis for AspectJ programs
Change impact analysis is a useful technique for software evolution. It determines the effects of a source editing session and provides valuable feedbacks to the programmers for m...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao
84
Voted
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 7 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
93
Voted
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 7 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao
94
Voted
ICCTA
2007
IEEE
15 years 7 months ago
A Study of Different Kinds of Degradation in Printed Gurmukhi Script
The performance of any OCR system heavily depends upon printing quality of the input document. Many OCRs have been designed which correctly identify fine printed documents both in...
Manish Kumar Jindal, Rajendra Kumar Sharma, Gurpre...
ICRA
2007
IEEE
157views Robotics» more  ICRA 2007»
15 years 7 months ago
Distributed Watchpoints: Debugging Large Multi-Robot Systems
Abstract— Tightly-coupled multi-agent systems such as modular robots frequently exhibit properties of interest that span multiple modules. These properties cannot easily be detec...
Michael DeRosa, Jason Campbell, Padmanabhan Pillai...