Sciweavers

860 search results - page 151 / 172
» An Efficient Technique for Distance Computation in Road Netw...
Sort
View
LAWEB
2006
IEEE
14 years 2 months ago
OWeB: A Framework for Offline Web Browsing
Internet browsing is highly dependent on the real-time network availability and speed. This becomes a significant constraint when browsing over slow and intermittent networks. In ...
Ganesh Ananthanarayanan, Sean Olin Blagsvedt, Kent...
CCS
2006
ACM
14 years 6 days ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CONEXT
2009
ACM
13 years 9 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
ECCV
2008
Springer
13 years 10 months ago
Active Image Labeling and Its Application to Facial Action Labeling
For many tasks in computer vision, it is very important to produce the groundtruth data. At present, this is mostly done manually. Manual data labeling is labor-intensive and prone...
Lei Zhang, Yan Tong, Qiang Ji
MOBICOM
2010
ACM
13 years 8 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun