In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities...
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
This paper introduces web-based 3D media information system. We first address two promising 3D modeling techniques, i.e., image-based 3D modeling and laser scanning based 3D model...
Yong-Moo Kwon, Ig-Jae Kim, Sang Chul Ahn, Hyoung-G...
Abstract. In this paper, we describe an innovative concept of threedimensional interactive educational games that combine the excitement and looks of popular computer games with th...