Sciweavers

10670 search results - page 2128 / 2134
» Required Information Release
Sort
View
CCS
2011
ACM
12 years 9 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CRV
2011
IEEE
305views Robotics» more  CRV 2011»
12 years 9 months ago
Motion Segmentation by Learning Homography Matrices from Motor Signals
—Motion information is an important cue for a robot to separate foreground moving objects from the static background world. Based on the observation that the motion of the backgr...
Changhai Xu, Jingen Liu, Benjamin Kuipers
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
DCOSS
2011
Springer
12 years 9 months ago
A local average consensus algorithm for wireless sensor networks
—In many application scenarios sensors need to calculate the average of some local values, e.g. of local measurements. A possible solution is to rely on consensus algorithms. In ...
Konstantin Avrachenkov, Mahmoud El Chamie, Giovann...
ASPLOS
2012
ACM
12 years 5 months ago
DejaVu: accelerating resource allocation in virtualized environments
Effective resource management of virtualized environments is a challenging task. State-of-the-art management systems either rely on analytical models or evaluate resource allocati...
Nedeljko Vasic, Dejan M. Novakovic, Svetozar Miuci...
« Prev « First page 2128 / 2134 Last » Next »