Sciweavers

1209 search results - page 126 / 242
» Security as a new dimension in embedded system design
Sort
View
CVPR
2011
IEEE
14 years 1 months ago
Discriminative Spatial Pyramid
Spatial Pyramid Representation (SPR) is a widely used method for embedding both global and local spatial information into a feature, and it shows good performance in terms of gene...
Tatsuya Harada, Yoshitaka Ushiku, Yuya Yamashita, ...
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
JSW
2007
102views more  JSW 2007»
14 years 9 months ago
A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems
— We propose a novel framework for building a distributed data acquisition and monitoring system. Our novel framework is mainly based on XML leverages and OPC (Openness, Producti...
Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi
WWW
2010
ACM
15 years 4 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
SOFTVIS
2003
ACM
15 years 3 months ago
3D Representations for Software Visualization
The paper presents a new 3D representation for visualizing large software systems. The origins of this representation can be directly traced to the SeeSoft metaphor. This work ext...
Andrian Marcus, Louis Feng, Jonathan I. Maletic