Sciweavers

1486 search results - page 248 / 298
» Firewall Rules Analysis
Sort
View
APSEC
2002
IEEE
15 years 4 months ago
An Automated Refactoring Approach to Design Pattern-Based Program Transformations in Java Programs
Software often needs to be modified for accommodating requirements changes through the software life cycle. To deal with several accidental requirements changes related to softwa...
Sang-Uk Jeon, Joon-Sang Lee, Doo-Hwan Bae
FGR
2002
IEEE
212views Biometrics» more  FGR 2002»
15 years 4 months ago
Motion-Based Recognition of People in EigenGait Space
A motion-based, correspondence-free technique for human gait recognition in monocular video is presented. We contend that the planar dynamics of a walking person are encoded in a ...
Chiraz BenAbdelkader, Larry S. Davis, Ross Cutler
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 4 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
MHCI
2009
Springer
15 years 4 months ago
Minimizing mobile phone disruption via smart profile management
In this paper, we describe the Smart Profile Management application that was designed to help minimize mobile phone disruptions. The system does this by making phone profile chang...
Amnon Dekel, Dan Nacht, Scott Kirkpatrick
AVBPA
2001
Springer
157views Biometrics» more  AVBPA 2001»
15 years 4 months ago
EigenGait: Motion-Based Recognition of People Using Image Self-Similarity
We present a novel technique for motion-based recognition of individual gaits in monocular sequences. Recent work has suggested that the image self-similarity plot of a moving per...
Chiraz BenAbdelkader, Ross Cutler, Harsh Nanda, La...