Sciweavers

1336 search results - page 242 / 268
» codes 2005
Sort
View
CCS
2005
ACM
15 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
ICIP
2005
IEEE
15 years 11 months ago
Image fusion using a new framework for complex wavelet transforms
Image fusion is the process of extracting meaningful visual information from two or more images and combinining them to form one fused image. Image fusion is important within many...
Paul R. Hill, David R. Bull, Cedric Nishan Canagar...
ECOOP
2005
Springer
15 years 3 months ago
Attached Types and Their Application to Three Open Problems of Object-Oriented Programming
The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
Bertrand Meyer
IEEECIT
2005
IEEE
15 years 3 months ago
Interactive Web Service Choice-Making Based on Extended QoS Model
: Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focu...
Yujie Mou, Jian Cao, Shen-sheng Zhang, Jianhong Zh...
BMCBI
2005
120views more  BMCBI 2005»
14 years 9 months ago
SpectralNET - an application for spectral graph analysis and visualization
Background: Graph theory provides a computational framework for modeling a variety of datasets including those emerging from genomics, proteomics, and chemical genetics. Networks ...
Joshua J. Forman, Paul A. Clemons, Stuart L. Schre...