Sciweavers

1183 search results - page 95 / 237
» On flow-sensitive security types
Sort
View
JLP
2010
142views more  JLP 2010»
14 years 11 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer
SPEECH
2010
208views more  SPEECH 2010»
14 years 11 months ago
Silent speech interfaces
The possibility of speech processing in the absence of an intelligible acoustic signal has given rise to the idea of a `silent speech' interface, to be used as an aid for the...
Bruce Denby, Thomas Schultz, Kiyoshi Honda, Thomas...

Publication
335views
13 years 7 months ago
Person Re-Identification: What Features are Important?
State-of-the-art person re-identi cation methods seek robust person matching through combining various feature types. Often, these features are implicitly assigned with a single ve...
Chunxiao Liu, Shaogang Gong, Chen Change Loy, Xing...
TPDS
2010
134views more  TPDS 2010»
14 years 11 months ago
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs
Null data frames are a special but important type of frames in IEEE 802.11 WLANs. They are widely used in 802.11 WLANs for control purposes such as power management, channel scanni...
Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia, Can...
IEEESP
2011
14 years 8 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...