Sciweavers

8600 search results - page 1299 / 1720
» Measuring with Timed Patterns
Sort
View
CODES
2006
IEEE
15 years 11 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
15 years 11 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
IUI
2006
ACM
15 years 11 months ago
Automatic prediction of misconceptions in multilingual computer-mediated communication
Multilingual communities using machine translation to overcome language barriers are showing up with increasing frequency. However, when a large number of translation errors get m...
Naomi Yamashita, Toru Ishida
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 11 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
MSR
2006
ACM
15 years 11 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
« Prev « First page 1299 / 1720 Last » Next »