Sciweavers

754 search results - page 112 / 151
» Generation of Signatures by Deformations
Sort
View
SEKE
2010
Springer
13 years 6 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
ASIACRYPT
2001
Springer
14 years 3 days ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
MICCAI
2009
Springer
14 years 4 months ago
A Statistical Model of Right Ventricle in Tetralogy of Fallot for Prediction of Remodelling and Therapy Planning
Tetralogy of Fallot (ToF) is a severe congenital heart disease that mainly affects the right ventricle (RV). It requires surgical repair early in infancy. Chronic regurgitations ma...
Tommaso Mansi, Stanley Durrleman, Boris Bernhardt,...
ISBMS
2010
Springer
14 years 2 months ago
Physics-Based Modeling of the Pregnant Woman
High quality obstetric images have become readily available with fast magnetic resonance imaging protocols or new 3D ultrasound probes. These obstetric images provide detailed info...
Juan Pablo de la Plata Alcalde, Lazar Bibin, J&eac...
ICCS
2007
Springer
14 years 1 months ago
Dynamic Tracking of Facial Expressions Using Adaptive, Overlapping Subspaces
We present a Dynamic Data Driven Application System (DDDAS) to track 2D shapes across large pose variations by learning non-linear shape manifold as overlapping, piecewise linear s...
Dimitris N. Metaxas, Atul Kanaujia, Zhiguo Li