Sciweavers

16843 search results - page 20 / 3369
» On Generalized Authorization Problems
Sort
View
ESORICS
2011
Springer
12 years 7 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
AIED
2005
Springer
14 years 1 months ago
Generating Reports of Graphical Modelling Processes for Authoring and Presentation
Today's computer supported modelling environments could provide much more information about the users’ actions and problem solving processes than they usually store for late...
Lars Bollen
EOR
2010
55views more  EOR 2010»
13 years 8 months ago
A queueing model for general group screening policies and dynamic item arrivals
The second author is a Postdoctoral Fellow with the Fund for Scientific Research, Flanders (F.W.O.-Vlaanderen), Belgium. 1
Dieter Claeys, Joris Walraevens, Koenraad Laevens,...
INFORMATICALT
2007
81views more  INFORMATICALT 2007»
13 years 8 months ago
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem
A generalized group-oriented cryptosystem (GGOC) based on ElGamal cryptosystem was proposed by Yang et al. in 2003. This study shows that if the authorized decryption sets of users...
Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
MM
2005
ACM
88views Multimedia» more  MM 2005»
14 years 1 months ago
LazyCut: content-aware template-based video authoring
Though there are many commercial video authoring tools available today, video authoring remains as a tedious and extremely time consuming task that often requires trained professi...
Xian-Sheng Hua, Zengzhi Wang, Shipeng Li