Sciweavers

881 search results - page 87 / 177
» A Model of Tolerance
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 1 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
EWC
2007
60views more  EWC 2007»
14 years 9 months ago
A simulation-based design paradigm for complex cast components
This paper describes and exercises a new design paradigm for cast components. The methodology integrates foundry process simulation, non-destructive evaluation (nde), stress analys...
Stéphane P. A. Bordas, James G. Conley, Bri...
CVPR
1996
IEEE
15 years 12 months ago
MUSE: Robust Surface Fitting using Unbiased Scale Estimates
Despite many successful applications of robust statistics, they have yet to be completely adapted to many computer vision problems. Range reconstruction, particularly in unstructu...
James V. Miller, Charles V. Stewart
VIS
2004
IEEE
214views Visualization» more  VIS 2004»
15 years 11 months ago
Surface Reconstruction of Noisy and Defective Data Sets
We present a novel surface reconstruction algorithm that can recover high-quality surfaces from noisy and defective data sets without any normal or orientation information. A set ...
Hui Xie, Kevin T. McDonnell, Hong Qin
AINA
2007
IEEE
15 years 4 months ago
Fuzzy Logic-Based Event Notification in Sparse MANETs
In the Ad-Hoc InfoWare project, we develop a delay tolerant event notification service for sparse Mobile Ad-Hoc Networks for emergency and rescue operations. In most event notific...
Anna K. Lekova, Katrine Stemland Skjelsvik, Thomas...