Sciweavers

143 search results - page 13 / 29
» A Range Test Secure in the Active Adversary Model
Sort
View
ISADS
1999
IEEE
14 years 27 days ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CVPR
2009
IEEE
15 years 3 months ago
On Compositional Image Alignment with an Application to Active Appearance Models
Efficient and accurate fitting of Active Appearance Models (AAM) is a key requirement for many applications. The most efficient fitting algorithm today is Inverse Compositional ...
Brian Amberg (University of Basel), Andrew Blake (...
OOPSLA
2007
Springer
14 years 2 months ago
Improving quality together
One recent change in software development is developers starting to take responsibility for the quality of their work by writing and executing automated tests. As with any new act...
David G. Jones, Gordon R. Cameron
ISER
1999
Springer
118views Robotics» more  ISER 1999»
14 years 26 days ago
ACME, A Telerobotic Active Measurement Facility
: We are developing a robotic measurement facility which makes it very easy to build “reality-based” models, i.e., computational models of existing, physical objects based on a...
Dinesh K. Pai, Jochen Lang, John E. Lloyd, Robert ...
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan