Sciweavers

636 search results - page 114 / 128
» Remote control for videoconferencing
Sort
View
CCS
2009
ACM
16 years 2 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
WWW
2010
ACM
15 years 8 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
IROS
2009
IEEE
178views Robotics» more  IROS 2009»
15 years 8 months ago
Mobile robots for offshore inspection and manipulation
— This paper analyzes the potential to apply mobile service robots in offshore oil and gas producing environments. The required hardware and software components and abilities of ...
Matthias Bengel, Kai Pfeiffer, Birgit Graf, Alexan...
ADBIS
2009
Springer
140views Database» more  ADBIS 2009»
15 years 8 months ago
Optimizing Maintenance of Constraint-Based Database Caches
Abstract. Caching data reduces user-perceived latency and often enhances availability in case of server crashes or network failures. DB caching aims at local processing of declarat...
Joachim Klein 0002, Susanne Braun
IEEEPACT
2006
IEEE
15 years 7 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...