Richard S. Weiss

According to our database1, Richard S. Weiss authored at least 38 papers between 1989 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Cybersecurity Education and Assessment in EDURange.
IEEE Security & Privacy, 2017

Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Finding the Balance Between Guidance and Independence in Cybersecurity Exercises.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

A Reflective Approach to Assessing Student Performance in Cybersecurity Exercises.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, Memphis, TN, USA, March 02, 2016

2015
Trust Evaluation in Mobile Devices: An Empirical Study.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Teaching Security Using Hands-on Exercises in 2015 (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Teaching Cybersecurity Analysis Skills in the Cloud.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Can the Security Mindset Make Students Better Testers?
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

2014
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

Hands-on cybersecurity exercises in the EDURange framework (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Teaching security using hands-on exercises (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Teaching the security mindset with reference monitors.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2013
Hands-on cybersecurity exercises and the rave virtual environment (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Teaching security using hands-on exercises (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2012
Hacking and the security curriculum: building community (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Hands-on denial of service lab exercises using SlowLoris and RUDY.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

2005
A Hierarchical Approach to Sign Recognition.
Proceedings of the 7th IEEE Workshop on Applications of Computer Vision / IEEE Workshop on Motion and Video Computing (WACV/MOTION 2005), 2005

Automatic Sign Detection and Recognition in Natural Scenes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2005

2004
Fetch Halting on Critical Load Misses.
Proceedings of the 22nd IEEE International Conference on Computer Design: VLSI in Computers & Processors (ICCD 2004), 2004

2003
Combining Software and Hardware Monitoring for Improved Power and Performance Tuning.
Proceedings of the 7th Annual Workshop on Interaction between Compilers and Computer Architecture (INTERACT-7 2003), 2003

2000
Can We Calibrate a Camera Using an Image of a Flat, Textureless Lambertian Surface?
Proceedings of the Computer Vision - ECCV 2000, 6th European Conference on Computer Vision, Dublin, Ireland, June 26, 2000

1999
Visual servoing control of autonomous robot calibration and navigation.
J. Field Robotics, 1999

Characterization of Errors in Compositing Panoramic Images.
Computer Vision and Image Understanding, 1999

1997
Obstacle Detection Based on Qualitative and Quantitative 3D Reconstruction.
IEEE Trans. Pattern Anal. Mach. Intell., 1997

Characterization of errors in compositing panoramic images.
Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition (CVPR '97), 1997

1995
Epipolar curves on surfaces.
Image Vision Comput., 1995

1994
Integrated control for interpreting and manipulating the robot environment.
Robotica, 1994

The Epipolar Parametrization.
Proceedings of the Object Representation in Computer Vision, 1994

Epipolar Fields on Surfaces.
Proceedings of the Computer Vision, 1994

Qualitative obstacle detection.
Proceedings of the Conference on Computer Vision and Pattern Recognition, 1994

1993
View Variation of Point-Set and Line-Segment Features.
IEEE Trans. Pattern Anal. Mach. Intell., 1993

Automatic Calibration and Visual Servoing for a Robot Navigation System.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993

1990
An Error Analysis for Surface Orientation from Vanishing Points.
IEEE Trans. Pattern Anal. Mach. Intell., 1990

Vanishing point calculation as a statistical inference on the unit sphere.
Proceedings of the Third International Conference on Computer Vision, 1990

1989
Token-based extraction of straight lines.
IEEE Trans. Systems, Man, and Cybernetics, 1989


  Loading...