Sciweavers

188 search results - page 35 / 38
» Finding Best k Policies
Sort
View
CCS
2008
ACM
13 years 10 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
PE
2002
Springer
150views Optimization» more  PE 2002»
13 years 8 months ago
Delimiting the range of effectiveness of scalable on-demand streaming
Previous analyses of scalable streaming protocols for delivery of stored multimedia have largely focused on how the server bandwidth required for full-file delivery scales as the ...
Haonan Tan, Derek L. Eager, Mary K. Vernon
CVPR
2009
IEEE
1626views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Coded Exposure Deblurring: Optimized Codes for PSF Estimation and Invertibility
We consider the problem of single image object motion deblurring from a static camera. It is well known that deblurring of moving objects using a traditional camera is ill-posed, d...
Amit K. Agrawal, Yi Xu

Publication
400views
15 years 3 months ago
Enforcing Integrability by Error Correction using L1-minimization
Surface reconstruction from gradient fields is an important final step in several applications involving gradient manipulations and estimation. Typically, the resulting gradient ...
Dikpal Reddy, Amit K. Agrawal, Rama Chellappa
ICSE
2008
IEEE-ACM
14 years 9 months ago
The effect of the number of inspectors on the defect estimates produced by capture-recapture models
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...