Sciweavers

2821 search results - page 25 / 565
» Tracing a single user
Sort
View
CISS
2007
IEEE
14 years 3 months ago
Emitter Localization and Visualization (ELVIS): A Backward Ray Tracing Algorithm for Locating Emitters
— We present ELVIS, a new approach for localizing a first responder (e.g., firefighter) inside a building. We assume that the first responder emits RF energy, which undergoes...
Aliye Özge Kaya, Larry J. Greenstein, Dmitry ...
NDSS
2005
IEEE
14 years 2 months ago
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Most Windows users run all the time with Admin privileges. This significantly increases the vulnerability of Windows systems because the compromise of any user-level application ...
Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wa...
ACMACE
2007
ACM
14 years 1 months ago
WikiTUI: leaving digital traces in physical books
This article describes the design of WikiTUI, a tangible user interface system that allows readers to manipulate multimedia information tied to page-level locations in common book...
Chih-Sung (Andy) Wu, Susan J. Robinson, Alexandra ...
BIRTHDAY
2004
Springer
14 years 2 months ago
A Trace Semantics for Long-Running Transactions
Abstract. A long-running transaction is an interactive component of a distributed system which must be executed as if it were a single atomic action. In principle, it should not be...
Michael J. Butler, C. A. R. Hoare, Carla Ferreira
CCS
2006
ACM
14 years 27 days ago
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems...
Dan Boneh, Brent Waters