Sciweavers

55 search results - page 6 / 11
» iccsa 2005
Sort
View
ICCSA
2005
Springer
14 years 3 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
ICCSA
2005
Springer
14 years 3 months ago
On URL Normalization
Since syntactically different URLs could represent the same resource in WWW, there are on-going efforts to define the URL normalization in the standard communities. This paper cons...
Sang Ho Lee, Sung Jin Kim, Seok-Hoo Hong
ICCSA
2005
Springer
14 years 3 months ago
Quasi-interpolants Based Multilevel B-Spline Surface Reconstruction from Scattered Data
Abstract. This paper presents a new fast and local method of 3D surface reconstruction for scattered data. The algorithm makes use of quasiinterpolants to compute the control point...
Byung-Gook Lee, Joon-Jae Lee, Ki-Ryoung Kwon
ICCSA
2005
Springer
14 years 3 months ago
High-Level Quantum Chemical Methods for the Study of Photochemical Processes
Multireference configuration interaction calculations have been performed on the excited state energy surfaces of the methyleneimmonium cation using recently developed methods for ...
Hans Lischka, Adélia J. A. Aquino, Mario Ba...
ICCSA
2005
Springer
14 years 3 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...