Sciweavers

434 search results - page 25 / 87
» The Case for Browser Provenance
Sort
View
CSREASAM
2006
13 years 10 months ago
Custom Plugin - A Solution to Phishing and Pharming Attacks
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Omer Mahmood
ALT
2004
Springer
14 years 5 months ago
Convergence of a Generalized Gradient Selection Approach for the Decomposition Method
The decomposition method is currently one of the major methods for solving the convex quadratic optimization problems being associated with support vector machines. For a special c...
Nikolas List
IROS
2006
IEEE
99views Robotics» more  IROS 2006»
14 years 2 months ago
A Cartesian Compliance Controller for a Manipulator Mounted on a Flexible Structure
— In this paper the Cartesian compliance control of a manipulator mounted on a flexible base is considered. The proposed control law aims at achieving a desired stiffness and da...
Christian Ott, Alin Albu-Schäffer, Gerd Hirzi...
IWCMC
2006
ACM
14 years 2 months ago
Bounds on the fading number of multiple-input single-output fading channels with memory
We derive new upper and lower bounds on the fading number of multiple-input single-output (MISO) fading channels of general (not necessarily Gaussian) regular law with spatial and...
Stefan M. Moser
ICPR
2000
IEEE
14 years 1 months ago
Vectorization in Graphics Recognition: To Thin or Not to Thin
Vectorization, i.e. raster–to–vector conversion, is a central part of graphics recognition problems. In this paper, we discuss the pros and the cons of basing one’s vectoriz...
Karl Tombre, Salvatore Tabbone