Sciweavers

210 search results - page 14 / 42
» Strategies for successful CRM implementation
Sort
View
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
12 years 4 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
WSC
2007
13 years 11 months ago
Optimizing time warp simulation with reinforcement learning techniques
Adaptive Time Warp protocols in the literature are usually based on a pre-defined analytic model of the system, expressed as a closed form function that maps system state to cont...
Jun Wang, Carl Tropper
ATVA
2008
Springer
86views Hardware» more  ATVA 2008»
13 years 10 months ago
NetQi: A Model Checker for Anticipation Game
Abstract. NetQi is a freely available model-checker designed to analyze network incidents such as intrusion. This tool is an implementation of the anticipation game framework, a va...
Elie Bursztein
SCIA
2005
Springer
203views Image Analysis» more  SCIA 2005»
14 years 2 months ago
Automated Multiple View Inspection Based on Uncalibrated Image Sequences
The Automated Multiple View Inspection (AMVI) has been recently developed for automated defect detection of manufactured objects. The approach detects defects by analysing image se...
Domingo Mery, Miguel Carrasco
DLOG
1996
13 years 10 months ago
DLMS: An Evaluation of KL-ONE in the Automobile Industry
Ford Motor Company's Direct Labor Management System (DLMS) utilizes knowledgerepresentation schemebased on the KL-ONEfamily of languages to represent the world of automobile ...
Nestor Rychtyckyj