Sciweavers

1702 search results - page 39 / 341
» Doomed program points
Sort
View
TMC
2010
179views more  TMC 2010»
15 years 2 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
ESORICS
2008
Springer
15 years 6 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
CBMS
2004
IEEE
15 years 8 months ago
Partial Shape Matching of Spine X-Ray Shapes Using Dynamic Programming
The osteophyte shows only on some particular locations on the vertebra. This indicates that other locations on the vertebra shape contain that are not of interest hinder the spine...
Xiaoqian Xu, D. J. Lee, Sameer Antani, L. Rodney L...
ICSE
1999
IEEE-ACM
15 years 8 months ago
Dynamically Discovering Likely Program Invariants to Support Program Evolution
ÐExplicitly stated program invariants can help programmers by identifying program properties that must be preserved when modifying code. In practice, however, these invariants are...
Michael D. Ernst, Jake Cockrell, William G. Griswo...
ACCV
2010
Springer
14 years 11 months ago
Monocular Template-Based Reconstruction of Smooth and Inextensible Surfaces
Abstract. We present different approaches to reconstructing an inextensible surface from point correspondences between an input image and a template image representing a flat refer...
Florent Brunet, Richard I. Hartley, Adrien Bartoli...