Sciweavers

14824 search results - page 2599 / 2965
» Security - Introduction
Sort
View
125
Voted
ACMSE
2004
ACM
15 years 9 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
155
Voted
CASES
2004
ACM
15 years 9 months ago
A low power architecture for embedded perception
Recognizing speech, gestures, and visual features are important interface capabilities for future embedded mobile systems. Unfortunately, the real-time performance requirements of...
Binu K. Mathew, Al Davis, Michael Parker
131
Voted
IUI
2004
ACM
15 years 9 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
JCDL
2004
ACM
106views Education» more  JCDL 2004»
15 years 9 months ago
Architecting an extensible digital repository
The Digital Collection and Archives (DCA) in partnership with Academic Technology (AT) at Tufts University developed a digital library solution for long-term storage and integrati...
Anoop Kumar, Ranjani Saigal, Robert Chavez, Nikola...
105
Voted
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
« Prev « First page 2599 / 2965 Last » Next »