Sciweavers

2874 search results - page 510 / 575
» Intrusion Detection: Systems and Models
Sort
View
FROCOS
2007
Springer
14 years 4 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
DFT
2006
IEEE
120views VLSI» more  DFT 2006»
14 years 4 months ago
On-Line Mapping of In-Field Defects in Image Sensor Arrays
Continued increase in complexity of digital image sensors means that defects are more likely to develop in the field, but little concrete information is available on in-field defe...
Jozsef Dudas, Cory Jung, Linda Wu, Glenn H. Chapma...
PASTE
2005
ACM
14 years 3 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
MIR
2003
ACM
161views Multimedia» more  MIR 2003»
14 years 3 months ago
Highlight scene extraction in real time from baseball live video
This paper proposes a method to automatically extract highlight scenes from sports (baseball) live video in real time and to allow users to retrieve them. For this purpose, sophis...
Yasuo Ariki, Masahito Kumano, Kiyoshi Tsukada
ICAPR
2001
Springer
14 years 2 months ago
Character Extraction from Interfering Background - Analysis of Double-Sided Handwritten Archival Documents
The sipping of ink through the pages of certain double-sided handwritten documents after long periods of storage poses a serious problem to human readers or OCR systems. This pape...
Chew Lim Tan, Ruini Cao, Qian Wang, Peiyi Shen