Sciweavers

21430 search results - page 3954 / 4286
» Abstract Effective Models
Sort
View
IJCV
2007
148views more  IJCV 2007»
15 years 4 months ago
Detection and Tracking of Multiple Metallic Objects in Millimetre-Wave Images
Abstract In this paper we present a system for the automatic detection and tracking of metallic objects concealed on moving people in sequences of millimetre-wave (MMW) images. The...
Christopher D. Haworth, Yves de Saint-Pern, D. Cla...
TALG
2008
124views more  TALG 2008»
15 years 4 months ago
Uniform deterministic dictionaries
Abstract. We present a new analysis of the well-known family of multiplicative hash functions, and improved deterministic algorithms for selecting "good" hash functions. ...
Milan Ruzic
TCAD
2008
75views more  TCAD 2008»
15 years 4 months ago
An Efficient Graph-Based Algorithm for ESD Current Path Analysis
Abstract--The electrostatic discharge (ESD) problem has become a challenging reliability issue in nanometer-circuit design. High voltages that resulted from ESD might cause high cu...
Chih-Hung Liu, Hung-Yi Liu, Chung-Wei Lin, Szu-Jui...
TCS
2008
15 years 4 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
ISCI
2007
135views more  ISCI 2007»
15 years 4 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
« Prev « First page 3954 / 4286 Last » Next »