Sciweavers

1763 search results - page 272 / 353
» A Formalization of Polytime Functions
Sort
View
ESORICS
2007
Springer
15 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ESWS
2007
Springer
15 years 4 months ago
Media, Politics and the Semantic Web
The media play an important role in the functioning of our society. This role is extensively studied by Communication Scientists, requiring a systematic analysis of media content. ...
Wouter van Atteveldt, Stefan Schlobach, Frank van ...
FMCAD
2007
Springer
15 years 4 months ago
Global Optimization of Compositional Systems
—Embedded systems typically consist of a composition of a set of hardware and software IP modules. Each module is heavily optimized by itself. However, when these modules are com...
Fadi A. Zaraket, John Pape, Adnan Aziz, Margarida ...
IFL
2007
Springer
120views Formal Methods» more  IFL 2007»
15 years 4 months ago
Lazy Contract Checking for Immutable Data Structures
Existing contract checkers for data structures force programmers to choose between poor alternatives. Contracts are either built into the functions that construct the data structur...
Robert Bruce Findler, Shu-yu Guo, Anne Rogers
IPMI
2007
Springer
15 years 4 months ago
Segmentation of Sub-cortical Structures by the Graph-Shifts Algorithm
Abstract. We propose a novel algorithm called graph-shifts for performing image segmentation and labeling. This algorithm makes use of a dynamic hierarchical representation of the ...
Jason J. Corso, Zhuowen Tu, Alan L. Yuille, Arthur...