Sciweavers

90 search results - page 7 / 18
» Many holes in hindley-milner
Sort
View
SAC
2011
ACM
12 years 10 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider
CVPR
2012
IEEE
11 years 9 months ago
Scene warping: Layer-based stereoscopic image resizing
This paper proposes scene warping, a layer-based stereoscopic image resizing method using image warping. The proposed method decomposes the input stereoscopic image pair into laye...
Ken-Yi Lee, Cheng-Da Chung, Yung-Yu Chuang
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 21 days ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany
SPW
1997
Springer
13 years 11 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
FC
2008
Springer
102views Cryptology» more  FC 2008»
13 years 9 months ago
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal ...
André N. Klingsheim, Kjell Jørgen Ho...