Sciweavers

203 search results - page 39 / 41
» Second-Order Risk Constraints
Sort
View
SISW
2003
IEEE
13 years 11 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
EMMCVPR
2003
Springer
13 years 11 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
DEXAW
1999
IEEE
322views Database» more  DEXAW 1999»
13 years 10 months ago
The Process of Inconsistency Management: A Framework for Understanding
The process of managing inconsistency is a fundamental activity that permeates a large part of the systems development process. Failure to identify inconsistencies may lead to maj...
Bashar Nuseibeh, Steve M. Easterbrook
ICCV
1999
IEEE
13 years 10 months ago
Camera Calibration and the Search for Infinity
This paper considers the problem of self-calibration of a camera from an image sequence in the case where the camera's internal parameters (most notably focal length) may cha...
Richard I. Hartley, Lourdes de Agapito, Ian D. Rei...
MOBICOM
1996
ACM
13 years 10 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble