Sciweavers

4761 search results - page 949 / 953
» Generalizing Boundary Points
Sort
View
CASE
2011
70views more  CASE 2011»
12 years 8 months ago
Automation of assembly and packaging at the micro/nano-scale
— This paper provides a general overview of the material covered in the fullday workshop with the same title devoted to the field of automation in microassembly and packaging at...
Micky Rakotondrabe, Yassine Haddab, Cédric ...
CCS
2011
ACM
12 years 8 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CCS
2011
ACM
12 years 8 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
HUC
2011
Springer
12 years 7 months ago
LightWave: using compact fluorescent lights as sensors
In this paper, we describe LightWave, a sensing approach that turns ordinary compact fluorescent light (CFL) bulbs into sensors of human proximity. Unmodified CFL bulbs are shown ...
Sidhant Gupta, Ke-Yu Chen, Matthew S. Reynolds, Sh...
ASPLOS
2012
ACM
12 years 3 months ago
DreamWeaver: architectural support for deep sleep
Numerous data center services exhibit low average utilization leading to poor energy efficiency. Although CPU voltage and frequency scaling historically has been an effective mea...
David Meisner, Thomas F. Wenisch