Sciweavers

796 search results - page 38 / 160
» Spoofing prevention method
Sort
View
RAID
2005
Springer
14 years 3 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
GRAPHICSINTERFACE
2007
13 years 11 months ago
Improved image quilting
In this paper, we present an improvement to the minimum error boundary cut, a method of shaping texture patches for nonparametric texture synthesis from example algorithms such as...
Jeremy Long, David Mould
IWEC
2008
13 years 11 months ago
Frame Selection for Automatic Comic Generation from Game Log
Recently, we have presented a comic generating system that visualizes an online-game play. Our system was inspired by a former work of Shamir et al. However, comics generated in th...
Tomonori Shuda, Ruck Thawonmas
ANSS
2008
IEEE
14 years 4 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
CVPR
2005
IEEE
14 years 12 months ago
A Caratheodory-Fejer Approach to Dynamic Appearance Modeling
This paper presents a technique to learn dynamic appearance models from a small number of training frames. Under this framework, dynamic appearance is modelled as an unknown opera...
Hwasup Lim, Octavia I. Camps, Mario Sznaier