Sciweavers

2719 search results - page 79 / 544
» Exposing Application Alternatives
Sort
View
PRDC
2005
IEEE
15 years 11 months ago
Server Protection through Dynamic Patching
Recently, hackers has been developing fast propagating worms exploiting vulnerabilities that had just been disclosed by security experts. Those attacks particularly expose servers...
Nicolas Loriant, Marc Ségura-Devillechaise,...
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
15 years 11 months ago
Design and Implementation of a Service-Oriented Business Rules Broker
Business rules define or constrain some business [24]. Many different business rules engines exist to capture and manage the rules that comprise ones business. The lack of standa...
Florian Rosenberg, Schahram Dustdar
EMMCVPR
2005
Springer
15 years 11 months ago
Spatio-temporal Prior Shape Constraint for Level Set Segmentation
Abstract. This paper exposes a novel formulation of prior shape constraint incorporation for the level set segmentation of objects from corrupted images. Applicable to variational ...
Timothée Bailloeul, Véronique Prinet...
FROCOS
2005
Springer
15 years 11 months ago
Logical Analysis of Hash Functions
Abstract. In this paper we report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducin...
Dejan Jovanovic, Predrag Janicic
ESAS
2004
Springer
15 years 11 months ago
A Security Architecture for Mobile Wireless Sensor Networks
Abstract. Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deployi...
Stefan Schmidt, Holger Krahn, Stefan Fischer, Diet...