We present a method for the efficient computation and storage of approximations of error tables used for error estimation of a region between different time steps in time-varying datasets. The error between two time s...
详细信息
One-time passwords (OTPs) have the advantage over regular passwords in that they protect legitimate users from replay attacks by generating a different password for each time of authentication. There are two variables...
详细信息
ISBN:
(纸本)9780769519326
One-time passwords (OTPs) have the advantage over regular passwords in that they protect legitimate users from replay attacks by generating a different password for each time of authentication. There are two variables that play a major role in creating a secure OTP; they are the passphrase length and the number of times the one-time password should be hashed. It is already a known fact that the larger the passphrase length the better is the security an OTP can offer. However, there is still a lack of quantitative analysis carried out to study how optimal Web security can be achieved. We propose a novel Web security evaluation model that can be used to measure the strength of a one-time password.
A growing trend in Software Engineering (SE) courses, especially in capstones, is to use an actual business or industry' client for case-based projects. We will broadly examine approaches taken to deal with situat...
详细信息
A growing trend in Software Engineering (SE) courses, especially in capstones, is to use an actual business or industry' client for case-based projects. We will broadly examine approaches taken to deal with situations occurring when projects with outside clients are brought into the classroom at various size institutions in different countries. Specifically we will discuss the issues of client management, team management, project assessment, and preparation and planning for courses utilizing external clients.
Estimating intrinsic geometric properties of a surface from a polygonal mesh obtained from range data is an important stage of numerous algorithms in computer and robot vision, computer graphics, geometric modeling, i...
详细信息
Estimating intrinsic geometric properties of a surface from a polygonal mesh obtained from range data is an important stage of numerous algorithms in computer and robot vision, computer graphics, geometric modeling, industrial and biomedical engineering. This work considers different computational schemes for local estimation of intrinsic curvature geometric properties. Five different algorithms and their modifications were tested on triangular meshes that represent tessellations of synthetic geometric models. The results were compared with the analytically computed values of the Gaussian and mean curvatures of the non-uniform rational B-spline (NURBs) surfaces, these meshes originated from. This work manifests the best algorithms suited for that indeed different algorithms should be employed to compute the Gaussian and mean curvatures.
We discuss some connections between polynomial time and non-uniform, small depth circuits. A connection is shown with simulating deterministic time in small space. The well known result of Hopcroft, Paul and Valiant [...
详细信息
The development of electronic commerce systems is subject to different conditions than that of conventional software systems. This includes the introduction of new activities to the development process and the removal...
详细信息
The development of electronic commerce systems is subject to different conditions than that of conventional software systems. This includes the introduction of new activities to the development process and the removal of others. An adapted process must cope with important idiosyncrasies of EC system development: EC systems typically have a high degree of interaction, which makes factors like ergonomics, didactics and psychology especially important in the development of user interfaces. Typically, they also have a high degree of integration with existing software systems such as legacy or groupware systems. Integration techniques have to be selected systematically in order not to endanger the whole software development process. This article describes the development of an EC system and it generalizes salient features of the software process used. The result is a process model that can be used for other highly integrative EC system development projects. The processes described are determined by short process lifecycles, by an orientation towards integration of legacy systems and by a strict role-based cooperation approach
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses forming streams can be targeted by optim...
详细信息
We combine topological and geometric methods to construct a multi-resolution data structure for functions over two-dimensional domains. Starting with the Morse-Smale complex, we construct a topological hierarchy by pr...
详细信息
We combine topological and geometric methods to construct a multi-resolution data structure for functions over two-dimensional domains. Starting with the Morse-Smale complex, we construct a topological hierarchy by progressively canceling critical points in pairs. Concurrently, we create a geometric hierarchy by adapting the geometry to the changes in topology. The data structure supports mesh traversal operations similarly to traditional multi-resolution representations.
暂无评论