Sciweavers

5684 search results - page 923 / 1137
» Computing with active dendrites
Sort
View
RAID
2007
Springer
15 years 11 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
SCALESPACE
2007
Springer
15 years 11 months ago
The Variational Origin of Motion by Gaussian Curvature
A variational formulation of an image analysis problem has the nice feature that it is often easier to predict the eect of minimizing a certain energy functional than to interpret...
Niels Chr. Overgaard, Jan Erik Solem
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 11 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
ACSD
2006
IEEE
105views Hardware» more  ACSD 2006»
15 years 11 months ago
Throughput Analysis of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) are a useful tool for modeling and analyzing embedded data flow applications, both in a single processor and a multiprocessing context or for...
Amir Hossein Ghamarian, Marc Geilen, Sander Stuijk...
ESCIENCE
2006
IEEE
15 years 11 months ago
Identifying Tools to Support Schools' Collaborative Teaching and Learning
Integration of e-Science and Grid technologies into curriculum teaching is currently an ambitious aim for teachers and school infrastructures to organise. However, it can expose c...
Hilary Smith, Joshua Underwood, Geraldine Fitzpatr...