Sciweavers

433 search results - page 46 / 87
» Contracts: From Analysis to C Implementation
Sort
View
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 3 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
JSC
2010
106views more  JSC 2010»
14 years 10 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...
CAIP
2007
Springer
128views Image Analysis» more  CAIP 2007»
15 years 3 months ago
Image Sifting for Micro Array Image Enhancement
: cDNA micro arrays are more and more frequently used in molecular biology as they can give insight into the relation of an organism's metabolism and its genome. The process o...
Pooria Jafari Moghadam, Mohammad Hassan Moradi
IMC
2004
ACM
15 years 5 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
IPPS
1996
IEEE
15 years 4 months ago
Parallel Algorithms for Image Enhancement and Segmentation by Region Growing with an Experimental Study
This paper presents e cient and portable implementations of a useful image enhancement process, the Symmetric Neighborhood Filter SNF, and an image segmentation technique which ma...
David A. Bader, Joseph JáJá, David H...