Sciweavers

977 search results - page 44 / 196
» Soft Constraints for Security
Sort
View
SMI
2006
IEEE
127views Image Analysis» more  SMI 2006»
15 years 4 months ago
Length Constrained Multiresolution Deformation for Surface Wrinkling
We present a method for deforming piecewise linear 3D curves with constant length constraint. We show how this constraint can be integrated into a multiresolution editing tool all...
Basile Sauvage, Stefanie Hahmann, Georges-Pierre B...
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
15 years 3 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj
WSS
2001
110views Control Systems» more  WSS 2001»
14 years 11 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
CCS
2009
ACM
15 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
ICCV
2011
IEEE
13 years 10 months ago
A Convex Framework for Image Segmentation with Moment Constraints
Convex relaxation techniques have become a popular approach to image segmentation as they allow to compute solutions independent of initialization to a variety of image segmentati...
Maria Klodt, Daniel Cremers