Sciweavers

15375 search results - page 365 / 3075
» cans 2008
Sort
View
SEC
2008
15 years 6 months ago
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Jeheon Han, Jonghoon Kwon, Heejo Lee
VVEIS
2007
15 years 5 months ago
Transformation of BPMN Models for Behaviour Analysis
Abstract. In industry, many business processes are modelled and stored in Enterprise Information Systems (EIS). Tools supporting the verification and validation of business process...
Ivo Raedts, Marija Petkovic, Yaroslav S. Usenko, J...
JCP
2008
161views more  JCP 2008»
15 years 4 months ago
Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding
Multi-pixel encoding is an emerging method in visual cryptography for that it can encode more than one pixel for each encoding run. Nevertheless, in fact its encoding efficiency is...
Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Hua...
PAMI
2008
152views more  PAMI 2008»
15 years 4 months ago
Class-Based Feature Matching Across Unrestricted Transformations
We develop a novel method for class-based feature matching across large changes in viewing conditions. The method (called MBE) is based on the property that when objects share a si...
Evgeniy Bart, Shimon Ullman
SYNTHESE
2008
102views more  SYNTHESE 2008»
15 years 4 months ago
Epistemic comparative conditionals
The interest of epistemic comparative conditionals comes from the fact that they represent genuine `comparative epistemic relations' between propositions, situations, evidence...
Linton Wang