Sciweavers

2697 search results - page 331 / 540
» Developing Gestural Input
Sort
View
KBSE
2005
IEEE
15 years 10 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
FCT
2005
Springer
15 years 10 months ago
Exact Algorithms for Graph Homomorphisms
Graph homomorphism, also called H-coloring, is a natural generalization of graph coloring: There is a homomorphism from a graph G to a complete graph on k vertices if and only if ...
Fedor V. Fomin, Pinar Heggernes, Dieter Kratsch
179
Voted
KES
2005
Springer
15 years 10 months ago
Ontology Modeling and Storage System for Robot Context Understanding
Abstract. A mobile robot that interacts with its environment needs a machineunderstandable representation of objects and their usages. We present an ontology of objects, with gener...
Eric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son,...
JCDL
2004
ACM
116views Education» more  JCDL 2004»
15 years 10 months ago
Lost in memories: interacting with photo collections on PDAs
We developed two browsers to support large personal photo collections on PDAs. Our first browser is based on a traditional, folder-based layout that utilizes either the user’s m...
Susumu Harada, Mor Naaman, Yee Jiun Song, QianYing...