Sciweavers

8009 search results - page 14 / 1602
» cans 2005
Sort
View
61
Voted
KBSE
2005
IEEE
15 years 3 months ago
Application of design for verification with concurrency controllers to air traffic control software
Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Be...
CG
2005
Springer
14 years 10 months ago
Sphere inversion fractals
Three-dimensional fractals consisting of constellations of spheres can be constructed by iterative sphere inversions. Three methods are explored in this brief artistic statement. ...
Jos Leys
72
Voted
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
15 years 3 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...
CEAS
2005
Springer
15 years 3 months ago
A Game Theoretic Model of Spam E-Mailing
We discuss how the interaction between spam senders and e-mail users can be modelled as a two-player adversary game. We show how the resulting model can be used to predict the str...
Ion Androutsopoulos, Evangelos F. Magirou, Dimitri...
ICIP
2005
IEEE
15 years 12 months ago
Locally adaptable mathematical morphology
We investigate how common binary mathematical morphology operators can be adapted so that the size of the structuring element (SE) can vary across the image. We show that when the...
Olivier Cuisenaire