Sciweavers

5722 search results - page 509 / 1145
» Security Function Interactions
Sort
View
PAAMS
2010
Springer
15 years 2 months ago
Agents to Help Context-Aware System in Home Care
Context-aware systems capture information from the attributes located within their surroundings and deal with different ways of interacting with the user in its environment. This p...
Juan A. Fraile, Dante I. Tapia, Jesús A. Ro...
ICCV
2011
IEEE
14 years 4 months ago
Generalized Roof Duality for Pseudo-Boolean Optimization
The number of applications in computer vision that model higher-order interactions has exploded over the last few years. The standard technique for solving such problems is to red...
Fredrik Kahl, Petter Strandmark
ACSAC
2003
IEEE
15 years 8 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
IACR
2011
124views more  IACR 2011»
14 years 4 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
UIST
2005
ACM
15 years 10 months ago
Preference elicitation for interface optimization
Decision-theoretic optimization is becoming a popular tool in the user interface community, but creating accurate cost (or utility) functions has become a bottleneck — in most c...
Krzysztof Gajos, Daniel S. Weld