Sciweavers

530 search results - page 90 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
HT
1998
ACM
14 years 3 months ago
Link services or link agents?
A general link service for the WWW has been used within an Electronic Libraries’ project. Experience using it shows that as the links become increasingly interesting to the user...
Les Carr, Wendy Hall, Steve Hitchcock
ICIP
2007
IEEE
14 years 2 months ago
Lipreading by Locality Discriminant Graph
The major problem in building a good lipreading system is to extract effective visual features from enormous quantity of video sequences data. For appearance-based feature analysi...
Yun Fu, Xi Zhou, Ming Liu, Mark Hasegawa-Johnson, ...
WWW
2011
ACM
13 years 5 months ago
Choreography conformance via synchronizability
Choreography analysis has been a crucial problem in service oriented computing. Interactions among services involve message exchanges across organizational boundaries in a distrib...
Samik Basu, Tevfik Bultan
ASPLOS
2012
ACM
12 years 6 months ago
Comprehensive kernel instrumentation via dynamic binary translation
Dynamic binary translation (DBT) is a powerful technique that enables fine-grained monitoring and manipulation of an existing program binary. At the user level, it has been emplo...
Peter Feiner, Angela Demke Brown, Ashvin Goel
CCS
2010
ACM
13 years 11 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...