Sciweavers

1522 search results - page 268 / 305
» Practical Exception Specifications
Sort
View
IEEESCC
2007
IEEE
14 years 2 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
SAINT
2007
IEEE
14 years 2 months ago
A Multi-Carrier UHF Passive RFID System
—The “Gen2” specification for UHF passive RFID systems released by EPCglobal has become an intense research interest. A Gen2 tag derives its power from the RF wave emitted by...
Hsin-Chin Liu, Yung-Ting Chen, Wen-Shin Tzeng
IWDW
2007
Springer
14 years 1 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
LADC
2007
Springer
14 years 1 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
PSIVT
2007
Springer
203views Multimedia» more  PSIVT 2007»
14 years 1 months ago
Direct Ellipse Fitting and Measuring Based on Shape Boundaries
: Measuring ellipticity is an important area of computer vision systems. Most existing ellipticity measures are area based and cannot be easily applied to point sets such as extrac...
Milos Stojmenovic, Amiya Nayak