Sciweavers

2539 search results - page 243 / 508
» Debugging Method Names
Sort
View
ER
2007
Springer
105views Database» more  ER 2007»
15 years 9 months ago
Clarifying Goal Models
Representation and reasoning about information system (IS) requirements is facilitated with the use of goal models to describe the desired and undesired IS behaviors. One difficul...
Ivan Jureta, Stéphane Faulkner
EUSAI
2007
Springer
15 years 9 months ago
How Computer Vision Can Help in Outdoor Positioning
Localization technologies have been an important focus in ubiquitous computing. This paper explores an underrepresented area, namely computer vision technology, for outdoor positio...
Ulrich Steinhoff, Dusan Omercevic, Roland Perko, B...
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
15 years 9 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...
ICB
2007
Springer
106views Biometrics» more  ICB 2007»
15 years 9 months ago
Vitality Detection from Fingerprint Images: A Critical Survey
Although fingerprint verification systems reached a high degree of accuracy, it has been recently shown that they can be circumvented by “fake fingers”, namely, fingerprint ima...
Pietro Coli, Gian Luca Marcialis, Fabio Roli
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
15 years 9 months ago
Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection
This paper addresses the biometric template security issue. Follow out previous work on class distribution transform, the proposed scheme selects the distinguish points automatical...
Yi C. Feng, Pong C. Yuen