Sciweavers

6293 search results - page 1008 / 1259
» Information Flow Testing
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ACSAC
2005
IEEE
15 years 10 months ago
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
Gaurav S. Kc, Angelos D. Keromytis
AMFG
2005
IEEE
183views Biometrics» more  AMFG 2005»
15 years 10 months ago
Parametric Stereo for Multi-pose Face Recognition and 3D-Face Modeling
This paper presents a new method for face modeling and face recognition from a pair of calibrated stereo cameras. In a first step, the algorithm builds a stereo reconstruction of...
Rik Fransens, Christoph Strecha, Luc J. Van Gool
CCGRID
2005
IEEE
15 years 10 months ago
Logistical multicast for data distribution
This paper describes a simple scheduling procedure for use in multicast data distribution within a logistical networking infrastructure. The goal of our scheduler is to generate a...
Jason Zurawski, D. Martin Swany, Micah Beck, Ying ...
CEC
2005
IEEE
15 years 10 months ago
Constraint quadratic approximation operator for treating equality constraints with genetic algorithms
Abstract- This paper presents a new operator for genetic algorithms that enhances their convergence in the case of nonlinear problems with nonlinear equality constraints. The propo...
Elizabeth F. Wanner, Frederico G. Guimarães...
« Prev « First page 1008 / 1259 Last » Next »