Sciweavers

303 search results - page 49 / 61
» Typing Safe Deallocation
Sort
View
ICRA
2009
IEEE
139views Robotics» more  ICRA 2009»
14 years 2 months ago
Laser-based navigation enhanced with 3D time-of-flight data
— Navigation and obstacle avoidance in robotics using planar laser scans has matured over the last decades. They basically enable robots to penetrate highly dynamic and populated...
Fang Yuan, Agnes Swadzba, Roland Philippsen, Orhan...
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
14 years 1 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
HICSS
2008
IEEE
83views Biometrics» more  HICSS 2008»
14 years 1 months ago
What, Who and Where: Insights into Personalization
Personalization is a phenomenon that intrigues and confuses. Personalized offerings promise customer attention, loyalty and safe haven against commoditization. However, these prom...
Anne Sunikka, Johanna Bragge
DDECS
2007
IEEE
140views Hardware» more  DDECS 2007»
14 years 1 months ago
A Framework for Self-Healing Radiation-Tolerant Implementations on Reconfigurable FPGAs
— To increase the amount of logic available in SRAM-based FPGAs manufacturers are using nanometric technologies to boost logic density and reduce prices. However, nanometric scal...
Manuel G. Gericota, Luís F. Lemos, Gustavo ...
CCS
2007
ACM
14 years 1 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida