Sciweavers

4498 search results - page 100 / 900
» How to Invent Functions
Sort
View
ICCCN
2008
IEEE
14 years 4 months ago
Policy Distribution Methods for Function Parallel Firewalls
—Parallel firewalls offer a scalable low latency design for inspecting packets at high speeds. Typically consisting of an array of m firewalls, these systems filter arriving p...
Michael R. Horvath, Errin W. Fulp, Patrick Wheeler
CTRSA
2007
Springer
184views Cryptology» more  CTRSA 2007»
14 years 4 months ago
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
FORK-256 is a hash function presented at FSE 2006. Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we pre...
Florian Mendel, Joseph Lano, Bart Preneel
DAGM
2007
Springer
14 years 4 months ago
Learning Robust Objective Functions with Application to Face Model Fitting
Abstract. Model-based image interpretation extracts high-level information from images using a priori knowledge about the object of interest. The computational challenge is to dete...
Matthias Wimmer, Sylvia Pietzsch, Freek Stulp, Ber...
LAWEB
2006
IEEE
14 years 4 months ago
Model-Based Design of Volatile Functionality in Web Applications
In this paper we present a model-based approach to integrate dynamic and volatile functionality in Web Applications. Our approach comprises an extension to the OOHDM design method...
Gustavo Rossi, Andres Nieto, Luciano Mengoni, Nahu...
ACMSE
2006
ACM
14 years 4 months ago
Using genetic algorithms to generate test plans for functionality testing
Like in other fields, computer products (applications, hardware, etc.), before being marketed, require some level of testing to verify whether they meet their design and function...
Francisca Emanuelle Vieira, Francisco Martins, Raf...