Sciweavers

7206 search results - page 1285 / 1442
» Using a Hypermedia System for Systems Engineering
Sort
View
128
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Gear scale estimation for synthetic speed pulse generation
In a motorized vehicle a number of easily measurable signals with frequency components related to the rotational speed of the engine can be found, e.g., vibrations, electrical sys...
John-Olof Nilsson, Isaac Skog, Alessio De Angelis,...
148
Voted
POPL
2012
ACM
13 years 11 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
183
Voted
WSDM
2012
ACM
207views Data Mining» more  WSDM 2012»
13 years 11 months ago
Domain bias in web search
This paper uncovers a new phenomenon in web search that we call domain bias — a user’s propensity to believe that a page is more relevant just because it comes from a particul...
Samuel Ieong, Nina Mishra, Eldar Sadikov, Li Zhang
161
Voted
ESORICS
2012
Springer
13 years 6 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
« Prev « First page 1285 / 1442 Last » Next »