Sciweavers

14779 search results - page 2894 / 2956
» On Ultrametric Algorithmic Information
Sort
View
CCS
2006
ACM
15 years 3 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
DSN
2004
IEEE
15 years 3 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
15 years 3 months ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
FGR
2004
IEEE
167views Biometrics» more  FGR 2004»
15 years 3 months ago
Adaptive Learning of an Accurate Skin-Color Model
Due to variations of lighting conditions, camera hardware settings, and the range of skin coloration among human beings, a pre-defined skin-color model cannot accurately capture t...
Qiang Zhu, Kwang-Ting Cheng, Ching-Tung Wu, Yi-Leh...
CCGRID
2001
IEEE
15 years 3 months ago
Cluster Computing in the Classroom: Topics, Guidelines, and Experiences
- With the progress of research on cluster computing, more and more universities have begun to offer various courses covering cluster computing. A wide variety of content can be ta...
Amy W. Apon, Rajkumar Buyya, Hai Jin, Jens Mache
« Prev « First page 2894 / 2956 Last » Next »