Sciweavers

438 search results - page 47 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
SIGGRAPH
2000
ACM
13 years 12 months ago
Plenoptic sampling
This paper studies the problem of plenoptic sampling in imagebased rendering (IBR). From a spectral analysis of light field signals and using the sampling theorem, we mathematica...
Jinxiang Chai, Shing-Chow Chan, Heung-Yeung Shum, ...
MKWI
2008
153views Business» more  MKWI 2008»
13 years 9 months ago
A Reference Architecture for Semantic Business Process Management Systems
: Semantic Business Process Management (SBPM) enhances BPM with semantic technologies in order to increase the degree of automation in the BPM lifecycle and help in bridging the ga...
Dimka Karastoyanova, Tammo van Lessen, Frank Leyma...
ACSAC
2009
IEEE
14 years 2 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
MEDIAFORENSICS
2010
13 years 6 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
RTS
2006
176views more  RTS 2006»
13 years 7 months ago
Verifying distributed real-time properties of embedded systems via graph transformations and model checking
Component middleware provides dependable and efficient platforms that support key functional, and quality of service (QoS) needs of distributed real-time embedded (DRE) systems. C...
Gabor Madl, Sherif Abdelwahed, Douglas C. Schmidt