Sciweavers

2697 search results - page 494 / 540
» Developing Gestural Input
Sort
View
AADEBUG
2005
Springer
14 years 3 months ago
Code coverage testing using hardware performance monitoring support
Code coverage analysis, the process of finding code exercised by a particular set of test inputs, is an important component of software development and verification. Most tradit...
Alex Shye, Matthew Iyer, Vijay Janapa Reddi, Danie...
CCS
2005
ACM
14 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 3 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
ICALP
2005
Springer
14 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
14 years 3 months ago
Hapticat: exploration of affective touch
This paper describes the Hapticat , a device we developed to study affect through touch. Though intentionally not highly zoomorphic, the device borrows behaviors from pets and th...
Steve Yohanan, Mavis Chan, Jeremy Hopkins, Haibo S...