Sciweavers

18374 search results - page 3579 / 3675
» Applications for data hiding
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ADL
1998
Springer
189views Digital Library» more  ADL 1998»
14 years 1 months ago
Semantic Relations in a Medical Digital Library
ct In this paper, we describe the VesaliusTM Project, a multi-modal collection of anatomical resourcesunder development at Columbia University. 1 Our focus is on the need for navig...
Nina Wacholder, Celina Imielinska, Judith Klavans,...
AGENTS
1998
Springer
14 years 1 months ago
Learning Situation-Dependent Costs: Improving Planning from Probabilistic Robot Execution
Physical domains are notoriously hard to model completely and correctly, especially to capture the dynamics of the environment. Moreover, since environments change, it is even mor...
Karen Zita Haigh, Manuela M. Veloso
CSCW
1998
ACM
14 years 1 months ago
The Dynamics of Mass Interaction
Usenet may be regarded as the world’s largest conversational application, with over 17,000 newsgroups and 3 million users. Despite its ubiquity and popularity, however, we know ...
Steve Whittaker, Loren G. Terveen, William C. Hill...
NPIV
1998
ACM
108views Visualization» more  NPIV 1998»
14 years 1 months ago
Visualization for situation awareness
We explore techniques from visualization and computational geometry to make tactical information more intuitive to a military commander. To be successful, the commander must quick...
C. M. Hoffman, Y.-J. Kim, R. P. Winkler, J. D. Wal...
« Prev « First page 3579 / 3675 Last » Next »