Sciweavers

13376 search results - page 2547 / 2676
» Problem Solving with
Sort
View
124
Voted
SKG
2006
IEEE
15 years 9 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
126
Voted
AMFG
2005
IEEE
146views Biometrics» more  AMFG 2005»
15 years 9 months ago
A Practical Face Relighting Method for Directional Lighting Normalization
We propose a simplified and practical computational technique for estimating directional lighting in uncalibrated images of faces in frontal pose. We show that this inverse probl...
Kuang-Chih Lee, Baback Moghaddam
142
Voted
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
15 years 9 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
116
Voted
TACAS
2005
Springer
113views Algorithms» more  TACAS 2005»
15 years 9 months ago
jETI: A Tool for Remote Tool Integration
Abstract. We present jETI, a redesign of the Electronic Tools Integration platform (ETI), that addresses the major issues and concerns accumulated over seven years of experience wi...
Tiziana Margaria, Ralf Nagel, Bernhard Steffen
MHCI
2004
Springer
15 years 8 months ago
A Prototype for Remote Vehicle Diagnostics
Abstract. The field of Remote Vehicle Diagnostics can be described as the remote management of vehicles equipped with electronic control systems. Despite the great potential that i...
Jonas Kuschel, Henrik Fagrell, Carl Johan Andersso...
« Prev « First page 2547 / 2676 Last » Next »