Search
Now showing items 11-20 of 24
Comparing Web Application Scanners For XSS Attacks
(Computer Science & Engineering, 2013-03-20)
As software industry is paying increasing attention to web application security, various testing tools with black box testing feature have been developed. To better evaluate their performance, researchers have made efforts ...
SubRosa 2 : An Experimental Evaluation Of Timing Analysis Attacks And Defenses In Anonymity Systems
(Computer Science & Engineering, 2013-03-20)
A circuit-based low-latency anonymous communication service such as Tor helps Internet users hide their IP addresses and thereby conceal their identities when communicating online. However, this kind of service is vulnerable ...
Learning Equivalent Input Channel Mappings And Generalized Features For Pattern Transfer
(Computer Science & Engineering, 2013-10-22)
In many real-world modeling applications, it is needed to detect the origin of the patterns of the input data in addition to find the patterns themselves. Having the input data generated by a systematically organized set ...
Detection Of Fingers With A Depth Based Hand-detector In Static Frames
(Computer Science & Engineering, 2013-10-23)
This thesis presents a method for a finger detection system. It is assumed that the user taps their fingers on a table, and that the camera is placed on the same table in front of their fingers. This setup is motivated by ...
Lilac: Architecture For Anonymous Light Weight Communication
(Computer Science & Engineering, 2013-10-23)
We present lilac; a circuit based low latency anonymous light weight instant messaging communication system. This browser based chat platform provides anonymity in context with unlinkability and unobservability for the ...
Improving Gesture Recognition Performance Using The Dynamic Space-time Warp Algorithm
(Computer Science & Engineering, 2013-07-22)
The DSTW algorithm was originally used as the fundamental algorithm for a gesture recognition software. When the need arose for implementing gesture recognition on-board a robotic vehicle, the original recognition software ...
Shaping Network Topology For Privacy And Performance
(Computer Science & Engineering, 2013-03-20)
Anonymity systems provide privacy for Internet communication and are becoming popular. Unfortunately, users experience slow Internet connection through existing systems because paths used to route traffic are selected ...
Querying Entity-relationship Graphs By Example Tuples: Experimental Evaluation And User Study
(Computer Science & Engineering, 2013-03-20)
The World Wide Web today has evolved into a rich repository of entities where many knowledge bases containing entity-related information are directly available. Such knowledge bases are often in the form of entity-relationship ...
Sign Gesture Spotting In American Sign Language Using Dynamic Space Time Warping
(Computer Science & Engineering, 2013-07-22)
American Sign Language (ASL) is the primary sign language used by approximately 500,000 deaf and hearing-impaired people in the United States and Canada. ASL is a visually perceived, gesture-based language that employs ...
System For Interpretation Of Reviewer Feedback On Social Web
(Computer Science & Engineering, 2013-03-20)
The increasing popularity of social media web sites such as Amazon, Yelp and others has influenced our online decision making. Before making selection decisions on movies and restaurants, we investigate its reviewer ...