Sciweavers

735 search results - page 107 / 147
» Corpora and data preparation
Sort
View
PAM
2007
Springer
15 years 4 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
ACSAC
2006
IEEE
15 years 4 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
AINA
2006
IEEE
15 years 4 months ago
On Optimization and Parallelization of Fuzzy Connected Segmentation for Medical Imaging
Fuzzy Connectedness is an important image segmentation routine for image processing of medical images. It is often used in preparation for surgery and sometimes during surgery. It...
Christopher Gammage, Vipin Chaudhary
ICWMC
2006
IEEE
15 years 4 months ago
An Ant-based Routing Protocol using Unidirectional Links for Heterogeneous Mobile Ad-Hoc Networks
Because of the heterogeneity in radio transceiver capabilities and influence of surroundings, unidirectional links arise in wireless mobile ad-hoc networks. Since most of existin...
Taro Maekawa, Harumasa Tada, Naoki Wakamiya, Makot...
EUROPKI
2005
Springer
15 years 3 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl