Sciweavers

5184 search results - page 1018 / 1037
» The digital divide of computing
Sort
View
MM
2010
ACM
402views Multimedia» more  MM 2010»
14 years 8 months ago
Discriminative codeword selection for image representation
Bag of features (BoF) representation has attracted an increasing amount of attention in large scale image processing systems. BoF representation treats images as loose collections...
Lijun Zhang 0005, Chun Chen, Jiajun Bu, Zhengguang...
TMC
2010
179views more  TMC 2010»
14 years 7 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
ACSAC
2010
IEEE
14 years 7 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ACSAC
2010
IEEE
14 years 7 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
127
Voted
AUGHUMAN
2010
14 years 7 months ago
Aided eyes: eye activity sensing for daily life
Our eyes collect a considerable amount of information when we use them to look at objects. In particular, eye movement allows us to gaze at an object and shows our level of intere...
Yoshio Ishiguro, Adiyan Mujibiya, Takashi Miyaki, ...
« Prev « First page 1018 / 1037 Last » Next »