Sciweavers

325 search results - page 65 / 65
» Detecting Merging and Splitting using Origin Analysis
Sort
View
SAC
2009
ACM
13 years 11 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
IPAS
2008
13 years 7 months ago
Multivariate mathematical morphology and Bayesian classifier application to colour and medical images
Multivariate images are now commonly produced in many applications. If their process is possible due to computers power and new programming languages, theoretical difficulties hav...
Arnaud Garcia, Corinne Vachier, Jean-Paul Vall&eac...
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
UM
2005
Springer
13 years 10 months ago
Modeling Students' Metacognitive Errors in Two Intelligent Tutoring Systems
Intelligent tutoring systems help students acquire cognitive skills by tracing students’ knowledge and providing relevant feedback. However, feedback that focuses only on the cog...
Ido Roll, Ryan Shaun Baker, Vincent Aleven, Bruce ...
IPSN
2009
Springer
13 years 11 months ago
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...