Sciweavers

368 search results - page 27 / 74
» formats 2004
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
ITRUST
2004
Springer
15 years 3 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
DAGM
2004
Springer
15 years 1 months ago
The Perceptual Influence of Spatiotemporal Noise on the Reconstruction of Shape from Dynamic Occlusion
Abstract. When an object moves, it covers and uncovers texture in the background. This pattern of change is sufficient to define the object's shape, velocity, relative depth, ...
Theresa Cooke, Douglas W. Cunningham, Heinrich H. ...
64
Voted
MICCAI
2004
Springer
15 years 10 months ago
Simulation Model of Intravascular Ultrasound Images
Abstract. The extraction of quantitative information through Intravascular Ultrasound (IVUS) images is a very important goal for the diagnostic and the therapy in atherosclerotic v...
Misael Dario Rosales Ramírez, Petia Radeva ...
ESTIMEDIA
2004
Springer
15 years 3 months ago
A hardware accelerator IP for EBCOT Tier-1 coding in JPEG2000 Standard
We proposed a hardware accelerator IP for the Tier-1 portion of Embedded Block Coding with Optimal Truncation (EBCOT) used in the JPEG2000 next generation image compression standa...
Tien-Wei Hsieh, Youn-Long Lin