Sciweavers

10910 search results - page 80 / 2182
» Input modeling using a computer algebra system
Sort
View
CHI
2010
ACM
15 years 4 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
SIBGRAPI
2003
IEEE
15 years 3 months ago
Picking and Snapping for 3D Input Devices
A picking mechanism (pointing and indicating) with the cursor is essential for any direct-manipulation application. The windowing systems, under which control a direct-manipulation...
Shin-Ting Wu, Marcel Abrantes, Daniel Tost, Harlen...
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ICCV
2007
IEEE
15 years 11 months ago
Trajectory Rectification and Path Modeling for Video Surveillance
Path modeling for video surveillance is an active area of research. We address the issue of Euclidean path modeling in a single camera for activity monitoring in a multicamera vid...
Imran N. Junejo, Hassan Foroosh
ESOP
2001
Springer
15 years 2 months ago
Modeling an Algebraic Stepper
Programmers rely on the correctness of the tools in their programming environments. In the past, semanticists have studied the correctness of compilers and compiler analyses, which...
John Clements, Matthew Flatt, Matthias Felleisen