Sciweavers

115 search results - page 20 / 23
» Exploiting Local and Global Invariants for the Management of...
Sort
View
ECRIME
2007
13 years 11 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
WWW
2008
ACM
14 years 8 months ago
Composing and optimizing data providing web services
In this paper, we propose a new approach to automatically compose data providing Web services. Our approach exploits existing mature works done in data integration systems. Specif...
Mahmoud Barhamgi, Djamal Benslimane, Aris M. Oukse...
CAISE
1999
Springer
13 years 12 months ago
A Practical Approach to Access Heterogeneous and Distributed Databases
A common problem within most large corporations nowadays is the diversity of database systems that are employed by their many departments in the development of a product. Usually, ...
Fernando de Ferreira Rezende, Ulrich Hermsen, Geor...
NEUROSCIENCE
2001
Springer
14 years 1 days ago
Recurrent Long-Range Interactions in Early Vision
Abstract. A general principle of cortical architecture is the bidirectional flow of information along feedforward and feedback connections. In the feedforward path, converging con...
Thorsten Hansen, Wolfgang Sepp, Heiko Neumann
ICIP
2002
IEEE
14 years 9 months ago
Real-time reconstruction of wavelet encoded meshes for view-dependent transmission and visualization
Wavelet methods for geometry encoding is a recently emerged superset of multiresolution analysis which has proven to be very efficient in term of compression and adaptive transmis...
Patrick Gioia, Oliver Aubault, Christian Bouville