Sciweavers

796 search results - page 125 / 160
» Spoofing prevention method
Sort
View
IJSSE
2010
121views more  IJSSE 2010»
13 years 7 months ago
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks
This paper presents an approach for retrofitting existing web applications with runtime protection against known as well as unseen SQL injection attacks (SQLIAs) without the invol...
San-Tsai Sun, Konstantin Beznosov
TIP
2011
89views more  TIP 2011»
13 years 4 months ago
Random Phase Textures: Theory and Synthesis
This paper explores the mathematical and algorithmic properties of two sample-based microtexture models: random phase noise (RPN ) and asymptotic discrete spot noise (ADSN ). Thes...
Bruno Galerne, Yann Gousseau, Jean-Michel Morel
IHI
2010
109views Healthcare» more  IHI 2010»
13 years 4 months ago
Process-based derivation of requirements for medical devices
One goal of medical device certification is to show that a given medical device satisfies its requirements. The requirements that should be met by a device, however, depend on the...
Heather M. Conboy, George S. Avrunin, Lori A. Clar...
PAMI
2010
162views more  PAMI 2010»
13 years 4 months ago
Differential Earth Mover's Distance with Its Applications to Visual Tracking
The Earth Mover's Distance (EMD) is a similarity measure that captures perceptual difference between two distributions. Its computational complexity, however, prevents a direc...
Qi Zhao, Zhi Yang, Hai Tao
TMM
2010
102views Management» more  TMM 2010»
13 years 4 months ago
A Real-Time Framework for Video Time and Pitch Scale Modification
A framework is presented which addresses the issues related to the real-time implementation of synchronized video and audio time-scale and pitch-scale modification algorithms. It a...
Ivan Damnjanovic, Dan Barry, David Dorran, Joshua ...