Sciweavers

5476 search results - page 934 / 1096
» Resettably Secure Computation
Sort
View
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 11 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
NCA
2007
IEEE
15 years 11 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...
NDSS
2007
IEEE
15 years 11 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...
NDSS
2007
IEEE
15 years 11 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
ACCV
2007
Springer
15 years 10 months ago
Comparative Studies on Multispectral Palm Image Fusion for Biometrics
Hand biometrics, including fingerprint, palmprint, hand geometry and hand vein pattern, have obtained extensive attention in recent years. Physiologically, skin is a complex multi...
Ying Hao, Zhenan Sun, Tieniu Tan