Sciweavers

1268 search results - page 186 / 254
» Direct Translation Model 2
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
A Taxonomy of Botnet Structures
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Usi...
David Dagon, Guofei Gu, Christopher P. Lee, Wenke ...
VTC
2007
IEEE
14 years 2 months ago
MMSE Based Interference Processing For Satellite Broadcast Reception
—The problem of Adjacent Satellite Interference (ACI) within the Direct-To-Home (DTH) satellite broadcast reception scenario is considered. The use of small DTH frontend receptio...
Klaus Schwarzenbarth, Joel Grotz, Björn E. Ot...
CHINZ
2006
ACM
14 years 2 months ago
Bare-hand 3D gesture input to interactive systems
Although the 2D desktop metaphor has been the dominating paradigm of user interfaces for over two decades, 3D models of interaction are becoming more feasible due to advances in c...
Pushkar Dhawale, Masood Masoodian, Bill Rogers
SMA
2006
ACM
150views Solid Modeling» more  SMA 2006»
14 years 2 months ago
Conformal virtual colon flattening
We present an efficient colon flattening algorithm using conformal structure, which is angle-preserving and minimizes the global distortion. Moreover, our algorithm is general w...
Wei Hong, Xianfeng Gu, Feng Qiu, Miao Jin, Arie E....
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
14 years 1 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya