Sciweavers

4584 search results - page 758 / 917
» interact 2007
Sort
View
ISMAR
2007
IEEE
15 years 11 months ago
A Method for Predicting Marker Tracking Error
Many Augmented Reality (AR) applications use marker-based vision tracking systems to recover camera pose by detecting one or more planar landmarks. However, most of these systems ...
Russell M. Freeman, Simon J. Juliet, Anthony Steed
162
Voted
IV
2007
IEEE
157views Visualization» more  IV 2007»
15 years 11 months ago
Towards a Model of Information Aesthetics in Information Visualization
This paper proposes a model of information aesthetics in the context of information visualization. It addresses the need to acknowledge a recently emerging number of visualization...
Andrea Lau, Andrew Vande Moere
KBSE
2007
IEEE
15 years 11 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
LICS
2007
IEEE
15 years 11 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 10 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang