Sciweavers

1056 search results - page 73 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ACMSE
2004
ACM
14 years 1 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
AMDO
2006
Springer
14 years 1 months ago
Efficient Incorporation of Motionless Foreground Objects for Adaptive Background Segmentation
In this paper, we want to exploit the knowledge obtained from those detected objects which are incorporated into the background model since they cease their movement. These motionl...
Ivan Huerta Casado, Daniel Rowe, Jordi Gonzà...
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
14 years 1 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...
PEPM
2000
ACM
14 years 1 months ago
From Recursion to Iteration: What are the Optimizations?
Transforming recursion into iteration eliminates the use of stack frames during program execution. It has been studied extensively. This paper describes a powerful and systematic ...
Yanhong A. Liu, Scott D. Stoller
SIGMOD
1991
ACM
81views Database» more  SIGMOD 1991»
14 years 1 months ago
Multi-Disk B-trees
In this paper, Dept. of Computer Science, University of Waterloo Waterloo, Ontario, Canada, N2L 3G1 we consider how to exploit multiple disks to improve the performance of B-tree ...
Bernhard Seeger, Per-Åke Larson