Sciweavers

1663 search results - page 185 / 333
» Computer Security in the Real World
Sort
View
ASPLOS
2009
ACM
15 years 8 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
TAMC
2009
Springer
15 years 10 months ago
The Extended Turing Model as Contextual Tool
Computability concerns information with a causal – typically algorithmic – structure. As such, it provides a schematic analysis of many naturally occurring situations. We look ...
S. Barry Cooper
ICIP
2003
IEEE
16 years 5 months ago
Navigating in Manhattan: 3D orientation from video without correspondences
The problem of inferring 3D orientation of a camera from video sequences has been mostly addressed by first computing correspondences of image features. This intermediate step is ...
André F. T. Martins, Mário A. T. Fig...
166
Voted
EWSN
2008
Springer
16 years 3 months ago
Discovery of Frequent Distributed Event Patterns in Sensor Networks
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
Kay Römer
ICCCN
2008
IEEE
15 years 10 months ago
LocSens - An Indoor Location Tracking System using Wireless Sensors
—Ubiquitous and pervasive computing envisions context-aware systems that gather real world information from many fixed and mobile microchips and sensors integrated in everyday o...
Faruk Bagci, Florian Kluge, Nader Bagherzadeh, The...