Sciweavers

1031 search results - page 124 / 207
» codes 2004
Sort
View
IDEAL
2004
Springer
15 years 4 months ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
ISW
2004
Springer
15 years 4 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
IWCM
2004
Springer
15 years 4 months ago
Divide-and-Conquer Strategies for Estimating Multiple Transparent Motions
Abstract. Motion estimation is essential in a variety of image processing and computer vision tasks, like video coding, tracking, directional filtering and denoising, scene analys...
Cicero Mota, Ingo Stuke, Til Aach, Erhardt Barth
LCPC
2004
Springer
15 years 4 months ago
Experiences in Using Cetus for Source-to-Source Transformations
Cetus is a compiler infrastructure for the source-to-source transformation of programs. Since its creation nearly three years ago, it has grown to over 12,000 lines of Java code, b...
Troy A. Johnson, Sang Ik Lee, Long Fei, Ayon Basum...
MDAFA
2004
Springer
178views Hardware» more  MDAFA 2004»
15 years 4 months ago
Model Bus: Towards the Interoperability of Modelling Tools
MDA software development requires the interoperability of a wide range of modelling services (operations taking models as inputs and outputs), such as model edition, model transfor...
Xavier Blanc, Marie-Pierre Gervais, Prawee Sriplak...