Sciweavers

985 search results - page 134 / 197
» On the validity of digital signatures
Sort
View
CCS
2009
ACM
14 years 1 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
EMSOFT
2008
Springer
13 years 11 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya
ICIP
2007
IEEE
14 years 11 months ago
Multisegment Detection
In this paper we propose a new method for detecting straight line segments in digital images. It improves upon existing methods by giving precise results while controlling the num...
Gregory Randall, Jérémie Jakubowicz,...
MICCAI
2009
Springer
14 years 11 months ago
Automatic Extraction of Mandibular Nerve and Bone from Cone-Beam CT Data
The exact localization of the mandibular nerve with respect to the bone is important for applications in dental implantology and maxillofacial surgery. Cone beam computed tomograph...
Dagmar Kainmueller, Hans Lamecker, Heiko Seim, ...
ISBI
2004
IEEE
14 years 10 months ago
Likelihood Function Analysis for Segmentation of Mammographic Masses for Various Margin Groups
The purpose of this work was to develop an automatic boundary detection method for mammographic masses and to observe the method's performance on different four of the five m...
Lisa Kinnard, Shih-Chung Ben Lo, Erini Makariou, T...