Sciweavers

1489 search results - page 29 / 298
» The First Bug Report
Sort
View
IMC
2009
ACM
15 years 4 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
TMC
2008
114views more  TMC 2008»
14 years 9 months ago
Toward Reliable and Efficient Reporting in Wireless Sensor Networks
Energy efficiency is one of the major concerns in wireless sensor networks, since it impacts the network lifetime. In this paper, we investigate the relationship between sensor net...
Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutab...
AIRS
2006
Springer
15 years 1 months ago
A Semantic Fusion Approach Between Medical Images and Reports Using UMLS
One of the main challenges in content-based image retrieval still remains to bridge the gap between low-level features and semantic information. In this paper, we present our first...
Daniel Racoceanu, Caroline Lacoste, Roxana Teodore...
ICSE
2005
IEEE-ACM
15 years 9 months ago
Do students recognize ambiguity in software design? a multi-national, multi-institutional report
Successful software engineering requires experience and acknowledgment of complexity, including that which leads designers to recognize ambiguity within the software design descri...
Ken Blaha, Alvaro E. Monge, Dean Sanders, Beth Sim...
86
Voted
CLEF
2010
Springer
14 years 10 months ago
A Textual-Based Similarity Approach for Efficient and Scalable External Plagiarism Analysis - Lab Report for PAN at CLEF 2010
In this paper we present an approach to detect external plagiarism based on textual similarity. This is an efficient and precise method that can be applied over large sets of docum...
Daniel Micol, Óscar Ferrández, Ferna...