Sciweavers

977 search results - page 44 / 196
» Soft Constraints for Security
Sort
View
SMI
2006
IEEE
127views Image Analysis» more  SMI 2006»
15 years 5 months ago
Length Constrained Multiresolution Deformation for Surface Wrinkling
We present a method for deforming piecewise linear 3D curves with constant length constraint. We show how this constraint can be integrated into a multiresolution editing tool all...
Basile Sauvage, Stefanie Hahmann, Georges-Pierre B...
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
15 years 5 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj
WSS
2001
110views Control Systems» more  WSS 2001»
15 years 1 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
87
Voted
CCS
2009
ACM
16 years 14 days ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
ICCV
2011
IEEE
13 years 12 months ago
A Convex Framework for Image Segmentation with Moment Constraints
Convex relaxation techniques have become a popular approach to image segmentation as they allow to compute solutions independent of initialization to a variety of image segmentati...
Maria Klodt, Daniel Cremers