Sciweavers

22560 search results - page 4356 / 4512
» Development of Transportation Systems
Sort
View
CCS
2007
ACM
14 years 4 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CIVR
2007
Springer
164views Image Analysis» more  CIVR 2007»
14 years 4 months ago
Inducing a perceptual relevance shape classifier
In this paper, we develop a system to classify the outputs of image segmentation algorithms as perceptually relevant or perceptually irrelevant with respect to human perception. T...
Victoria J. Hodge, John P. Eakins, James Austin
CLEF
2007
Springer
14 years 4 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy
ER
2007
Springer
137views Database» more  ER 2007»
14 years 4 months ago
Prioritized Preferences and Choice Constraints
It is increasingly recognised that user preferences should be addressed in many advanced database applications, such as adaptive searching in databases. However, the fundamental is...
Wilfred Ng
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 4 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
« Prev « First page 4356 / 4512 Last » Next »