Sciweavers

536 search results - page 39 / 108
» Deconstructing process isolation
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
IROS
2009
IEEE
149views Robotics» more  IROS 2009»
14 years 3 months ago
Mutual localization in a multi-robot system with anonymous relative position measures
— We address the mutual localization problem for a multi-robot system, under the assumption that each robot is equipped with a sensor that provides a measure of the relative posi...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno
AVSS
2007
IEEE
14 years 3 months ago
Single camera calibration for trajectory-based behavior analysis
Perspective deformations on the image plane make the analysis of object behaviors difficult in surveillance video. In this paper, we improve the results of trajectory-based scene...
Nadeem Anjum, Andrea Cavallaro
ICIP
2006
IEEE
14 years 2 months ago
A Theory of Aliasing Separation for Light Field Data
A light field means a 4-D function which characterizes the flow of light rays from a target scene, and used for image-based rendering. This paper presents a novel theoretical fr...
Keita Takahashi, Takeshi Naemura
ICDCSW
2003
IEEE
14 years 1 months ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra