Sciweavers

1152 search results - page 208 / 231
» Long Term Trends for Embedded System Design
Sort
View
139
Voted
MOBICOM
2012
ACM
13 years 4 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
150
Voted
OOPSLA
2004
Springer
15 years 7 months ago
Chianti: a tool for change impact analysis of java programs
This paper reports on the design and implementation of Chianti, a change impact analysis tool for Java that is implemented in the context of the Eclipse environment. Chianti analy...
Xiaoxia Ren, Fenil Shah, Frank Tip, Barbara G. Ryd...
CCS
2008
ACM
15 years 3 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
SENSYS
2010
ACM
14 years 11 months ago
PipeProbe: a mobile sensor droplet for mapping hidden pipeline
This paper presents PipeProbe, a mobile sensor system for determining the spatial topology of hidden water pipelines behind walls. PipeProbe works by dropping a tiny wireless sens...
Tsung-Te Lai, Yu-Han Chen, Polly Huang, Hao-Hua Ch...
CODES
2008
IEEE
15 years 8 months ago
Intra- and inter-processor hybrid performance modeling for MPSoC architectures
The heterogeneity of modern MPSoC architectures, coupled with the increasing complexity of the applications mapped onto them has recently led to a lot of interest in hybrid perfor...
Frank E. B. Ophelders, Samarjit Chakraborty, Henk ...