Sciweavers

16513 search results - page 3213 / 3303
» Numerical Analysis Methods
Sort
View
CCS
2004
ACM
15 years 8 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
126
Voted
ECCV
2004
Springer
15 years 8 months ago
Statistical Learning of Evaluation Function for ASM/AAM Image Alignment
Alignment between the input and target objects has great impact on the performance of image analysis and recognition system, such as those for medical image and face recognition. A...
Xiangsheng Huang, Stan Z. Li, Yangsheng Wang
ER
2004
Springer
169views Database» more  ER 2004»
15 years 8 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
FMCAD
2004
Springer
15 years 8 months ago
Proof Styles in Operational Semantics
Abstract. We relate two well-studied methodologies in deductive verification of operationally modeled sequential programs, namely the use of inductive invariants and clock functio...
Sandip Ray, J. Strother Moore
« Prev « First page 3213 / 3303 Last » Next »