Sciweavers

1422 search results - page 238 / 285
» Design, Implementation and Performance Evaluation of IP-VPN
Sort
View
CCS
2010
ACM
14 years 10 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
RAS
2010
164views more  RAS 2010»
14 years 9 months ago
Bridging the gap between feature- and grid-based SLAM
One important design decision for the development of autonomously navigating mobile robots is the choice of the representation of the environment. This includes the question which...
Kai M. Wurm, Cyrill Stachniss, Giorgio Grisetti
ACSAC
2010
IEEE
14 years 9 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
16 years 15 days ago
COLR-Tree: Communication-Efficient Spatio-Temporal Indexing for a Sensor Data Web Portal
Abstract-- We present COLR-Tree, an abstraction layer designed to support efficient spatio-temporal queries on live data gathered from a large collection of sensors. We use COLR-Tr...
Yanif Ahmad, Suman Nath
ICSE
2009
IEEE-ACM
15 years 12 months ago
FlexSync: An aspect-oriented approach to Java synchronization
Designers of concurrent programs are faced with many choices of synchronization mechanisms, among which clear functional trade-offs exist. Making synchronization customizable is h...
Charles Zhang