Sciweavers

303 search results - page 49 / 61
» Typing Safe Deallocation
Sort
View
134
Voted
ICRA
2009
IEEE
139views Robotics» more  ICRA 2009»
15 years 10 months ago
Laser-based navigation enhanced with 3D time-of-flight data
— Navigation and obstacle avoidance in robotics using planar laser scans has matured over the last decades. They basically enable robots to penetrate highly dynamic and populated...
Fang Yuan, Agnes Swadzba, Roland Philippsen, Orhan...
107
Voted
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
15 years 10 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
122
Voted
HICSS
2008
IEEE
83views Biometrics» more  HICSS 2008»
15 years 10 months ago
What, Who and Where: Insights into Personalization
Personalization is a phenomenon that intrigues and confuses. Personalized offerings promise customer attention, loyalty and safe haven against commoditization. However, these prom...
Anne Sunikka, Johanna Bragge
134
Voted
DDECS
2007
IEEE
140views Hardware» more  DDECS 2007»
15 years 10 months ago
A Framework for Self-Healing Radiation-Tolerant Implementations on Reconfigurable FPGAs
— To increase the amount of logic available in SRAM-based FPGAs manufacturers are using nanometric technologies to boost logic density and reduce prices. However, nanometric scal...
Manuel G. Gericota, Luís F. Lemos, Gustavo ...
113
Voted
CCS
2007
ACM
15 years 9 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida