Sciweavers

3604 search results - page 604 / 721
» All Common Subsequences
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 10 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
ICB
2009
Springer
142views Biometrics» more  ICB 2009»
15 years 10 months ago
Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints
Law enforcement agencies routinely collect both rolled and plain fingerprints of all the ten fingers of suspects. These two types of fingerprints complement each other, since ro...
Jianjiang Feng, Soweon Yoon, Anil K. Jain
IWSEC
2009
Springer
15 years 10 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
OOPSLA
2009
Springer
15 years 10 months ago
Parallel programming with object assemblies
We present Chorus, a high-level parallel programming model suitable for irregular, heap-manipulating applications like mesh refinement and epidemic simulations, and JChorus, an i...
Roberto Lublinerman, Swarat Chaudhuri, Pavol Cern&...
OTM
2009
Springer
15 years 10 months ago
Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems
The need for semantics preserving integration of complex data has been widely recognized in the healthcare domain. While standards such as Health Level Seven (HL7) have been develo...
Antoine Zimmermann, Ratnesh Sahay, Ronan Fox, Axel...