Sciweavers

300 search results - page 33 / 60
» A study on the value of location privacy
Sort
View
CCS
2006
ACM
14 years 15 days ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...
ISI
2004
Springer
14 years 2 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 3 months ago
Persistent Robotic Tasks: Monitoring and Sweeping in Changing Environments
—We present controllers that enable mobile robots to persistently monitor or sweep a changing environment. The changing environment is modeled as a field which grows in location...
Stephen L. Smith, Mac Schwager, Daniela Rus
OOPSLA
2005
Springer
14 years 2 months ago
Using predicate fields in a highly flexible industrial control system
Predicate fields allow an object’s structure to vary at runtime based on the object’s state: a predicate field is present or not, depending on the values of other fields. P...
Shay Artzi, Michael D. Ernst
EDBT
2009
ACM
195views Database» more  EDBT 2009»
14 years 3 months ago
Anonymizing moving objects: how to hide a MOB in a crowd?
Moving object databases (MOD) have gained much interest in recent years due to the advances in mobile communications and positioning technologies. Study of MOD can reveal useful i...
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshm...