Sciweavers

551 search results - page 62 / 111
» Preventing existence
Sort
View
SISW
2003
IEEE
15 years 5 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 5 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
ICSE
2009
IEEE-ACM
15 years 4 months ago
A compositional approach to bidirectional model transformation
Bidirectional model transformation plays an important role in maintaining consistency between two models, and has many potential applications in software development, including mo...
Soichiro Hidaka, Zhenjiang Hu, Hiroyuki Kato, Keis...
ECCV
2010
Springer
15 years 4 months ago
From a Set of Shapes to Object Discovery
Abstract. This paper presents an approach to object discovery in a given unlabeled image set, based on mining repetitive spatial configurations of image contours. Contours that si...
ACSAC
2000
IEEE
15 years 4 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim