Sciweavers

666 search results - page 112 / 134
» A Persistent Hyper-Programming System
Sort
View
CCS
2010
ACM
13 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
CCR
2008
166views more  CCR 2008»
13 years 10 months ago
A day at the root of the internet
We analyzed the largest simultaneous collection of full-payload packet traces from a core component of the global Internet infrastructure ever made available to academic researche...
Sebastian Castro, Duane Wessels, Marina Fomenkov, ...
CORR
2008
Springer
153views Education» more  CORR 2008»
13 years 10 months ago
Efficient and Robust Secure Aggregation for Sensor Networks
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
PAMI
2002
136views more  PAMI 2002»
13 years 9 months ago
On the Individuality of Fingerprints
Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerpr...
Sharath Pankanti, Salil Prabhakar, Anil K. Jain
TROB
2002
101views more  TROB 2002»
13 years 9 months ago
Two solutions to the adaptive visual servoing problem
In this paper, we present two globally convergent vision-based position controllers for a planar two-links manipulator in the so-called fixed-camera configuration, where the camera...
Alessandro Astolfi, Liu Hsu, Mariana S. Netto, Rom...