Sciweavers

2821 search results - page 497 / 565
» Tracing a single user
Sort
View
NETWORKING
2011
14 years 2 months ago
The Problem of Sensing Unused Cellular Spectrum
Abstract. Sensing mechanisms that estimate the occupancy of wireless spectrum are crucial to the success of approaches based on Dynamic Spectrum Access. In this paper, we present k...
Daniel Willkomm, Sridhar Machiraju, Jean Bolot, Ad...
CCS
2011
ACM
13 years 12 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
ECOOP
2011
Springer
13 years 11 months ago
Tunable Static Inference for Generic Universe Types
Object ownership is useful for many applications, including program verification, thread synchronization, and memory management. However, the annotation overhead of ownership type...
Werner Dietl, Michael D. Ernst, Peter Müller
HRI
2012
ACM
13 years 7 months ago
How to use non-linguistic utterances to convey emotion in child-robot interaction
Vocal affective displays are vital for achieving engaging and effective Human-Robot Interaction. The same can be said for linguistic interaction also, however, while emphasis ma...
Robin Read, Tony Belpaeme
SIGCOMM
2012
ACM
13 years 2 months ago
Choice as a principle in network architecture
There has been a great interest in defining a new network architecture that can meet the needs of a future Internet. One of the main challenges in this context is how to realize ...
Tilman Wolf, James Griffioen, Kenneth L. Calvert, ...