Sciweavers

1653 search results - page 177 / 331
» Timed analysis of security protocols
Sort
View
121
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
129
Voted
CSFW
2003
IEEE
15 years 8 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
225
Voted

Publication
283views
14 years 1 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
128
Voted
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
15 years 8 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
122
Voted
JNW
2007
118views more  JNW 2007»
15 years 2 months ago
Collision Prevention Platform for a Dynamic Group of Asynchronous Cooperative Mobile Robots
— This paper presents a fail-safe platform on which cooperative mobile robots rely for their motion. The platform consists of a collision prevention protocol for a dynamic group ...
Rami Yared, Xavier Défago, Julien Iguchi-Ca...