Sciweavers

601 search results - page 90 / 121
» Verifiable Network-Performance Measurements
Sort
View
ADCOG
2004
15 years 4 months ago
Social and Ethical Considerations in Virtual Worlds
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
Robert W. Kerbs
122
Voted
SEC
2004
15 years 4 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
SSWMC
2004
15 years 4 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
WSCG
2004
185views more  WSCG 2004»
15 years 4 months ago
Automatic Fitting and Control of Complex Freeform Shapes in 3-D
In many computer graphics and computer-aided design problems, it is very common to find a smooth and well structured surface to fit a set of unstructured 3-dimensional data. Altho...
Yu Song, Joris S. M. Vergeest, Chensheng Wang
117
Voted
ATVA
2010
Springer
125views Hardware» more  ATVA 2010»
15 years 4 months ago
Using Redundant Constraints for Refinement
Abstract. This paper is concerned with a method for computing reachable sets of linear continuous systems with uncertain input. Such a method is required for verification of hybrid...
Eugene Asarin, Thao Dang, Oded Maler, Romain Testy...