Sciweavers

1424 search results - page 96 / 285
» Improving on Version Stamps
Sort
View
LISA
2001
15 years 17 days ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
77
Voted
CVGIP
2006
163views more  CVGIP 2006»
14 years 11 months ago
SVD-matching using SIFT features
The paper tackles the problem of feature points matching between pair of images of the same scene. This is a key problem in computer vision. The method we discuss here is a versio...
Elisabetta Delponte, Francesco Isgrò, Franc...
COR
2007
133views more  COR 2007»
14 years 11 months ago
Reverse logistics network design with stochastic lead times
This work is concerned with the efficient design of a reverse logistics network using an extended version of models currently found in the literature. Those traditional, basic mo...
Kris Lieckens, Nico Vandaele
99
Voted
JIIS
2008
104views more  JIIS 2008»
14 years 11 months ago
Transaction Management for Flash Media Databases in Portable Computing Environments
Flash memory is becoming a major database storage in building embedded systems or portable devices because of its non-volatile, shock-resistant, power-economic nature, and fast acc...
Siwoo Byun
JCP
2006
120views more  JCP 2006»
14 years 11 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio