Sciweavers

33 search results - page 6 / 7
» tal 2004
Sort
View
PST
2004
14 years 8 days ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
EUROCRYPT
2004
Springer
14 years 2 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
ECCV
2004
Springer
15 years 23 days ago
Causal Camera Motion Estimation by Condensation and Robust Statistics Distance Measures
The problem of Simultaneous Localization And Mapping (SLAM) originally arose from the robotics community and is closely related to the problems of camera motion estimation and stru...
Tal Nir, Alfred M. Bruckstein
CCGRID
2004
IEEE
14 years 2 months ago
DWDM-RAM: enabling Grid services with dynamic optical networks
Advances in Grid technology enable the deployment of data-intensive distributed applications, which require moving Terabytes or even Petabytes of data between data banks. The curr...
Silvia M. Figueira, Sumit Naiksatam, Howard J. Coh...
AAAI
2004
14 years 9 days ago
Methods for Domain-Independent Information Extraction from the Web: An Experimental Comparison
Our KNOWITALL system aims to automate the tedious process of extracting large collections of facts (e.g., names of scientists or politicians) from the Web in an autonomous, domain...
Oren Etzioni, Michael J. Cafarella, Doug Downey, A...