Sciweavers

39 search results - page 7 / 8
» Automatic analysis of distance bounding protocols
Sort
View
CAIP
1999
Springer
180views Image Analysis» more  CAIP 1999»
13 years 10 months ago
A Scale-Space Approach to Face Recognition from Profiles
A method for face recognition using profile images based on the scale-space filtering is presented in this paper. A grey-level image of profile is thresholded to produce a binary, ...
Zdravko Liposcak, Sven Loncaric
PODC
2006
ACM
13 years 11 months ago
Optimal-stretch name-independent compact routing in doubling metrics
We consider the problem of name-independent routing in doubling metrics. A doubling metric is a metric space whose doubling dimension is a constant, where the doubling dimension o...
Goran Konjevod, Andréa W. Richa, Donglin Xi...
ANCS
2005
ACM
13 years 11 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
APN
2007
Springer
13 years 11 months ago
History-Dependent Petri Nets
Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails. We cons...
Kees M. van Hee, Alexander Serebrenik, Natalia Sid...
SSD
2005
Springer
150views Database» more  SSD 2005»
13 years 11 months ago
Opportunistic Data Dissemination in Mobile Peer-to-Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-to-peer networks, where moving objects communicate with each other via short-range...
A. Prasad Sistla, Ouri Wolfson, Bo Xu