Sciweavers

452 search results - page 69 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
BCSHCI
2009
14 years 10 months ago
A vision-based system for display interaction
This paper presents a system for interaction with a display via hand pointing, where a single CCD camera on top of the screen is directed towards the viewers. An attention mechani...
Björn Stenger, Thomas Woodley, Tae-Kyun Kim, ...
AISC
1998
Springer
15 years 1 months ago
Reasoning About Coding Theory: The Benefits We Get from Computer Algebra
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
Clemens Ballarin, Lawrence C. Paulson
INFOCOM
2012
IEEE
13 years 3 days ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
UIST
2005
ACM
15 years 3 months ago
PlayAnywhere: a compact interactive tabletop projection-vision system
We introduce PlayAnywhere, a front-projected computer vision-based interactive table system which uses a new commercially available projection technology to obtain a compact, self...
Andrew D. Wilson
WWW
2010
ACM
15 years 4 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...