Sciweavers

2068 search results - page 268 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
CCS
2008
ACM
15 years 7 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
146
Voted
CW
2005
IEEE
15 years 6 months ago
Using a Floating Origin to Improve Fidelity and Performance of Large, Distributed Virtual Worlds
Large Virtual Worlds (VWs) are increasingly common in the computer graphics areas of simulation, games, geospatial or scientific visualisation. In such VWs, simulated motion of th...
Chris Thorne
COLCOM
2008
IEEE
15 years 6 months ago
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites
Abstract. Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey cli...
Jiang Wang, Anup K. Ghosh, Yih Huang
SCSC
2007
15 years 6 months ago
Damage mechanics modeling of concurrent thermal and vibration loading on electronics packaging
— The problem of concurrent thermal and vibration loading has not been thoroughly studied even though it is common in electronic packaging applications. Here we attempt to addres...
Cemal Basaran, Juan Gomez, Minghui Lin, Shidong Li
AAAI
2006
15 years 6 months ago
Table Extraction Using Spatial Reasoning on the CSS2 Visual Box Model
Tables on web pages contain a huge amount of semantically explicit information, which makes them a worthwhile target for automatic information extraction and knowledge acquisition...
Wolfgang Gatterbauer, Paul Bohunsky