Sciweavers

557 search results - page 90 / 112
» Two experiences designing for effective security
Sort
View
SPIN
2010
Springer
14 years 10 months ago
Experimental Comparison of Concolic and Random Testing for Java Card Applets
Concolic testing is a method for test input generation where a given program is executed both concretely and symbolically at the same time. This paper introduces the LIME Concolic ...
Kari Kähkönen, Roland Kindermann, Keijo ...
CONEXT
2010
ACM
14 years 10 months ago
Auto-configuration of 802.11n WLANs
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of...
Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioann...
UIST
2010
ACM
14 years 9 months ago
TwinSpace: an infrastructure for cross-reality team spaces
We introduce TwinSpace, a flexible software infrastructure for combining interactive workspaces and collaborative virtual worlds. Its design is grounded in the need to support dee...
Derek F. Reilly, Hafez Rouzati, Andy Wu, Jee Yeon ...
ISM
2005
IEEE
212views Multimedia» more  ISM 2005»
15 years 5 months ago
Neural Network Based Framework For Goal Event Detection In Soccer Videos
In this paper, a neural network based framework for semantic event detection in soccer videos is proposed. The framework provides a robust solution for soccer goal event detection...
Kasun Wickramaratna, Min Chen, Shu-Ching Chen, Mei...
AVI
2008
15 years 2 months ago
Evaluation of pointing performance on screen edges
Pointing on screen edges is a frequent task in our everyday use of computers. Screen edges can help stop cursor movements, requiring less precise movements from the user. Thus, po...
Caroline Appert, Olivier Chapuis, Michel Beaudouin...