Sciweavers

7379 search results - page 1338 / 1476
» How Many Clusters
Sort
View
NDSS
2008
IEEE
14 years 5 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
NDSS
2008
IEEE
14 years 5 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
RAM
2008
IEEE
124views Robotics» more  RAM 2008»
14 years 5 months ago
Mechatronics Considerations for Assisting Humans
Mechatronics technologies are now steadily penetrating in our daily lives. We are surrounded by mechatronic products and interact with them in many ways. In particular, mechatroni...
Masayoshi Tomizuka
VR
2008
IEEE
155views Virtual Reality» more  VR 2008»
14 years 5 months ago
The Effects of Virtual Reality, Augmented Reality, and Motion Parallax on Egocentric Depth Perception
As the use of virtual and augmented reality applications becomes more common, the need to fully understand how observers perceive spatial relationships grows more critical. One of...
Adam Jones, J. Edward Swan II, Gurjot Singh, Eric ...
AH
2008
Springer
14 years 5 months ago
A Validation Framework for Formal Models in Adaptive Work-Integrated Learning
The focus of my thesis is on the development of a multi-method framework for the validation of formal models (domain model, user model, and teaching model) for adaptive work-integr...
Barbara Kump
« Prev « First page 1338 / 1476 Last » Next »