Sciweavers

355 search results - page 46 / 71
» Security Test Generation Using Threat Trees
Sort
View
SOUPS
2009
ACM
14 years 4 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
HUMO
2007
Springer
14 years 1 months ago
Efficient Upper Body Pose Estimation from a Single Image or a Sequence
We propose a method to find candidate 2D articulated model configurations by searching for locally optimal configurations under a weak but computationally manageable fitness functi...
Matheen Siddiqui, Gérard G. Medioni
ENTCS
2008
103views more  ENTCS 2008»
13 years 10 months ago
Systematic Semantic Tableaux for PLTL
The better known methods of semantic tableaux for deciding satisfiability in propositional linear temporal logic generate graphs in addition to classical trees. The test of satisf...
Joxe Gaintzarain, Montserrat Hermo, Paqui Lucio, M...
ACSAC
2006
IEEE
14 years 3 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
EOR
2002
84views more  EOR 2002»
13 years 9 months ago
Solving container loading problems by block arrangement
In order to solve heterogeneous single and multiple container loading problems, an algorithm is presented that builds homogeneous blocks of identically orientated items. First a g...
Michael Eley