Sciweavers

1141 search results - page 193 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
SEKE
2010
Springer
15 years 2 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SIAMDM
2010
140views more  SIAMDM 2010»
15 years 2 months ago
Retractions to Pseudoforests
For a fixed graph H, let Ret(H) denote the problem of deciding whether a given input graph is retractable to H. We classify the complexity of Ret(H) when H is a graph (with loops ...
Tomás Feder, Pavol Hell, Peter Jonsson, And...
ICIP
2009
IEEE
15 years 1 months ago
Eye reflection analysis and application to display-camera calibration
We present a novel technique for calibrating display-camera systems from reflections in the user's eyes. Display-camera systems enable a range of vision applications that nee...
Christian Nitschke, Atsushi Nakazawa, Haruo Takemu...
138
Voted
ICN
2005
Springer
15 years 9 months ago
Quality Adapted Backlight Scaling (QABS) for Video Streaming to Mobile Handheld Devices
Abstract. For a typical portable handheld device, the backlight accounts for a significant percentage of the total energy consumption (e.g., around 30% for a Compaq iPAQ 3650). Su...
Liang Cheng, Stefano Bossi, Shivajit Mohapatra, Ma...
CCR
2010
133views more  CCR 2010»
15 years 4 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...