Sciweavers

4270 search results - page 681 / 854
» Implementation of interactive poster
Sort
View
USS
2008
15 years 6 months ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell
USS
2008
15 years 6 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
WSC
2007
15 years 6 months ago
Self organized UAV swarm planning optimization for search and destroy using SWARMFARE simulation
As military interest continues to grow for Unmanned Aerial Vehicle (UAV) capabilities, the Air Force is exploring UAV autonomous control, mission planning and optimization techniq...
Dustin J. Nowak, Ian C. Price, Gary B. Lamont
134
Voted
WSC
2008
15 years 6 months ago
Simulating culture: An experiment using a multi-user virtual environment
With increased levels of global trade, foreign policy making, foreign travel, and distance collaboration using the Internet, the issue of culture takes center stage. One needs to ...
Paul A. Fishwick, Julie Henderson, Elinore Fresh, ...
ASPDAC
2008
ACM
134views Hardware» more  ASPDAC 2008»
15 years 6 months ago
Automatic re-coding of reference code into structured and analyzable SoC models
The quality of the input system model has a direct bearing on the effectiveness of the system exploration and synthesis tools. Given a well-structured system model, tools today are...
Pramod Chandraiah, Rainer Dömer