Sciweavers

8177 search results - page 1437 / 1636
» Detecting System Emulators
Sort
View
PET
2007
Springer
15 years 10 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
133
Voted
SEKE
2007
Springer
15 years 10 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
TELETRAFFIC
2007
Springer
15 years 10 months ago
Adaptive Congestion Control Under Dynamic Weather Condition for Wireless and Satellite Networks
Broadband satellite-based IP networks have been considered as the technology to enable a strong and promising next-generation market. In satellite communication systems, the channe...
Hongqing Zeng, Anand Srinivasan, Brian Cheng, Chan...
3DPVT
2006
IEEE
257views Visualization» more  3DPVT 2006»
15 years 10 months ago
3D from Line Segments in Two Poorly-Textured, Uncalibrated Images
This paper addresses the problem of camera selfcalibration, bundle adjustment and 3D reconstruction from line segments in two images of poorly-textured indoor scenes. First, we ge...
Herbert Bay, Andreas Ess, Alexander Neubeck, Luc J...
3DPVT
2006
IEEE
186views Visualization» more  3DPVT 2006»
15 years 10 months ago
Range Image Registration Based on Circular Features
Range sensing technology allows the photo-realistic modeling of large-scale scenes, such as urban structures. A major bottleneck in the process of 3D scene acquisition is the auto...
Cecilia Chao Chen, Ioannis Stamos
« Prev « First page 1437 / 1636 Last » Next »