Sciweavers

20573 search results - page 4030 / 4115
» The Computer's New Clothes
Sort
View
MOBICOM
2010
ACM
13 years 8 months ago
Exploiting temporal stability and low-rank structure for localization in mobile networks
Localization is a fundamental operation for many wireless networks. While GPS is widely used for location determination, it is unavailable in many environments either due to its h...
Swati Rallapalli, Lili Qiu, Yin Zhang, Yi-Chao Che...
CCS
2010
ACM
13 years 8 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
CCS
2010
ACM
13 years 8 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
SIGCOMM
2010
ACM
13 years 8 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
CIMAGING
2010
165views Hardware» more  CIMAGING 2010»
13 years 8 months ago
Virtual surgical modification for planning tetralogy of Fallot repair
Goals for treating congenital heart defects are becoming increasingly focused on the long-term, targeting solutions that last into adulthood. Although this shift has motivated the...
Jonathan Plasencia, Haithem Babiker, Randy Richard...
« Prev « First page 4030 / 4115 Last » Next »