Sciweavers

796 search results - page 38 / 160
» Spoofing prevention method
Sort
View
RAID
2005
Springer
15 years 8 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
GRAPHICSINTERFACE
2007
15 years 4 months ago
Improved image quilting
In this paper, we present an improvement to the minimum error boundary cut, a method of shaping texture patches for nonparametric texture synthesis from example algorithms such as...
Jeremy Long, David Mould
IWEC
2008
15 years 4 months ago
Frame Selection for Automatic Comic Generation from Game Log
Recently, we have presented a comic generating system that visualizes an online-game play. Our system was inspired by a former work of Shamir et al. However, comics generated in th...
Tomonori Shuda, Ruck Thawonmas
ANSS
2008
IEEE
15 years 9 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
CVPR
2005
IEEE
16 years 5 months ago
A Caratheodory-Fejer Approach to Dynamic Appearance Modeling
This paper presents a technique to learn dynamic appearance models from a small number of training frames. Under this framework, dynamic appearance is modelled as an unknown opera...
Hwasup Lim, Octavia I. Camps, Mario Sznaier