Sciweavers

122 search results - page 14 / 25
» The First Report on Scheme Revisited
Sort
View
SIAMNUM
2010
118views more  SIAMNUM 2010»
13 years 3 months ago
Discontinuous Galerkin Methods for Solving Elliptic Variational Inequalities
Abstract. We study discontinuous Galerkin methods for solving elliptic variational inequalities, of both the first and second kinds. Analysis of numerous discontinuous Galerkin sch...
Fei Wang, Weimin Han, Xiao-Liang Cheng
TIP
2010
144views more  TIP 2010»
13 years 3 months ago
Direction-Adaptive Partitioned Block Transform for Color Image Coding
- In this report, we investigate the application of Direction Adaptive-Partitioned Block Transform (DA-PBT) to color images and propose a basic framework for DA-PBT Color Image Cod...
Chuo-Ling Chang, Mina Makar, Sam S. Tsai, Bernd Gi...
ECRIME
2007
14 years 28 days ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ACSAC
2010
IEEE
13 years 7 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
CCS
2009
ACM
14 years 9 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin