Sciweavers

1489 search results - page 29 / 298
» The First Bug Report
Sort
View
111
Voted
IMC
2009
ACM
15 years 10 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
141
Voted
TMC
2008
114views more  TMC 2008»
15 years 3 months ago
Toward Reliable and Efficient Reporting in Wireless Sensor Networks
Energy efficiency is one of the major concerns in wireless sensor networks, since it impacts the network lifetime. In this paper, we investigate the relationship between sensor net...
Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutab...
144
Voted
AIRS
2006
Springer
15 years 7 months ago
A Semantic Fusion Approach Between Medical Images and Reports Using UMLS
One of the main challenges in content-based image retrieval still remains to bridge the gap between low-level features and semantic information. In this paper, we present our first...
Daniel Racoceanu, Caroline Lacoste, Roxana Teodore...
126
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Do students recognize ambiguity in software design? a multi-national, multi-institutional report
Successful software engineering requires experience and acknowledgment of complexity, including that which leads designers to recognize ambiguity within the software design descri...
Ken Blaha, Alvaro E. Monge, Dean Sanders, Beth Sim...
139
Voted
CLEF
2010
Springer
15 years 4 months ago
A Textual-Based Similarity Approach for Efficient and Scalable External Plagiarism Analysis - Lab Report for PAN at CLEF 2010
In this paper we present an approach to detect external plagiarism based on textual similarity. This is an efficient and precise method that can be applied over large sets of docum...
Daniel Micol, Óscar Ferrández, Ferna...