Sciweavers

3238 search results - page 41 / 648
» Not Enough Points Is Enough
Sort
View
AINA
2007
IEEE
14 years 2 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
ICDS
2007
IEEE
14 years 2 months ago
On Burst Loss in Optical Burst Switched Networks with Hot Potato Deflection Routing
In this article we investigate the effects of increased Control Packet lead Time (CPT) on the loss probability of bursts in an OBS network with deflection routing. In particular w...
Stein Gjessing
ACCV
2007
Springer
14 years 1 months ago
Viewpoint Insensitive Action Recognition Using Envelop Shape
Action recognition is a popular and important research topic in computer vision. However, it is challenging when facing viewpoint variance. So far, most researches in action recogn...
Feiyue Huang, Guangyou Xu
SAS
2007
Springer
128views Formal Methods» more  SAS 2007»
14 years 1 months ago
Magic-Sets Transformation for the Analysis of Java Bytecode
Denotational static analysis of Java bytecode has a nice and clean compositional definition and an efficient implementation with binary decision diagrams. But it models only the f...
Étienne Payet, Fausto Spoto
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
14 years 1 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...