Sciweavers

5435 search results - page 1041 / 1087
» Informed Detection Revisited
Sort
View
PODC
2005
ACM
15 years 9 months ago
Proof labeling schemes
The problem of verifying a Minimum Spanning Tree (MST) was introduced by Tarjan in a sequential setting. Given a graph and a tree that spans it, the algorithm is required to check...
Amos Korman, Shay Kutten, David Peleg
128
Voted
UIST
2005
ACM
15 years 9 months ago
eyeLook: using attention to facilitate mobile media consumption
One of the problems with mobile media devices is that they may distract users during critical everyday tasks, such as navigating the streets of a busy city. We addressed this issu...
Connor Dickie, Roel Vertegaal, Changuk Sohn, Danie...
170
Voted
CCS
2005
ACM
15 years 9 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
IPMI
2005
Springer
15 years 9 months ago
Imaging Tumor Microenvironment with Ultrasound
Abstract. Recent advances in molecular biology are providing new opportunities for breast cancer imaging. Our approach uses ultrasound to image viscoelastic features of tumors. The...
Mallika Sridhar, Michael F. Insana
123
Voted
MMMACNS
2005
Springer
15 years 9 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
« Prev « First page 1041 / 1087 Last » Next »