Sciweavers

8 search results - page 2 / 2
» Nothing Ventured, Nothing Gained
Sort
View
HOST
2008
IEEE
14 years 7 days ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
INTERNET
2008
150views more  INTERNET 2008»
13 years 5 months ago
RPC and REST: Dilemma, Disruption, and Displacement
straction and explained how the Representational State Transfer (REST) architectural style is one alternative that can yield a superior approach to building distributed systems. Be...
Steve Vinoski
ECCV
2008
Springer
14 years 7 months ago
Differential Spatial Resection - Pose Estimation Using a Single Local Image Feature
Robust local image features have been used successfully in robot localization and camera pose estimation; region tracking using affine warps is considered state of the art also for...
Kevin Köser, Reinhard Koch