نتایج جستجو برای: disable

تعداد نتایج: 1148  

2016
Ruchi Sharma Manoj Kumar Sharma Amarjeet Singh

People with disabilities have the same fundamental right to access mainstream services in the community (education, health-care, employment, social services and social protection) as any other citizen. Inclusive transport is a critical element in a comprehensive strategy of mainstreaming people with disabilities in developing countries. A freely accessible society without any physical obstacles...

2014
Rob Jansen Florian Tschorsch Aaron Johnson Björn Scheuermann

Tor is a distributed onion-routing network used for achieving anonymity and resisting censorship online. Because of Tor’s growing popularity, it is attracting increasingly larger threats against which it was not securely designed. In this paper, we present the Sniper Attack, an extremely low cost but highly destructive denial of service attack against Tor that an adversary may use to anonymousl...

2004
Sarah Spiekermann Oliver Berthold

The presence of RFID technology in every-day life is expected to become a reality in the near future. Yet, as RFID tags enter consumer households and threaten to identify their owners’ belongings, whereabouts and habits concerns arise about the maintenance of privacy. People are afraid of being ‘scanned’ or tracked with the help of a technology that is invisible to them and not under their cont...

2014
Matthew Brocker Stephen Checkoway

The ubiquitous webcam indicator LED is an important privacy feature which provides a visual cue that the camera is turned on. We describe how to disable the LED on a class of Apple internal iSight webcams used in some versions of MacBook laptops and iMac desktops. This enables video to be captured without any visual indication to the user and can be accomplished entirely in user space by an unp...

Journal: :CoRR 2016
Ajay Agrawal R. S. Gamad

This paper presents a design of low power data channel for application in High Definition Multimedia Interface (HDMI) Transmitter circuit. The input is 10 bit parallel data and output is serial data at 1.65 Gbps. This circuit uses only a single frequency of serial clock input. All other timing signals are derived within the circuit from the serial clock. This design has dedicated lines to disab...

2016
Yelizaveta Burakova Bill Hass Leif Millar André Weimerskirch

Consumer vehicles have been proven to be insecure; the addition of electronics to monitor and control vehicle functions have added complexity resulting in safety critical vulnerabilities. Heavy commercial vehicles have also begun adding electronic control systems similar to consumer vehicles. We show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives ea...

2013
Ryan Farley Xinyuan Wang

As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone. In this paper, we investigate the security ramifications that VoIP softphones expose their host to and ways to mitigate such threats. We show that crafted SIP traffic (noisy attack) can disable...

Journal: :Nordic Machine Intelligence 2021

In this paper, we aim to enhance the segmentation capabilities of DeeplabV3 by employing Gated Recurrent Neural Network (GRU). A 1-by-1 convolution in was replaced GRU after Atrous Spatial Pyramid Pooling (ASSP) layer combine input feature maps. The and have sharable parameters, though, latter has gates that enable/disable contribution each map. experiments on unseen test sets demonstrate inste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید