Sciweavers

853 search results - page 75 / 171
» New test approach for embedded applications
Sort
View
CCS
2007
ACM
15 years 7 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
122
Voted
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 6 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
ICASSP
2010
IEEE
15 years 1 months ago
Hiding information inside structured shapes
This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
Samarjit Das, Shantanu Rane, Anthony Vetro
MCS
2009
Springer
15 years 8 months ago
Recoding Error-Correcting Output Codes
Abstract. One of the most widely applied techniques to deal with multiclass categorization problems is the pairwise voting procedure. Recently, this classical approach has been emb...
Sergio Escalera, Oriol Pujol, Petia Radeva
ICCV
2005
IEEE
16 years 3 months ago
Deformation Invariant Image Matching
We propose a novel framework to build descriptors of local intensity that are invariant to general deformations. In this framework, an image is embedded as a 2D surface in 3D spac...
Haibin Ling, David W. Jacobs