Sciweavers

10106 search results - page 1974 / 2022
» Algorithm Selection and Scheduling
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 5 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ICRA
2003
IEEE
163views Robotics» more  ICRA 2003»
15 years 5 months ago
An experimental study of hybrid switched system approaches to visual servoing
Abstract— In the recent past, many researchers have developed control algorithms for visual servo applications. In this paper, we introduce a new hybrid switched system approach,...
Nicholas R. Gans, Seth Hutchinson
IRI
2003
IEEE
15 years 5 months ago
Damage Pattern Mining in Hurricane Image Databases
– We present a damage pattern mining framework for hurricane data on residential houses using aerial photographs with 1:3000 based scale. The vertical photographs are normally co...
Shu-Ching Chen, Mei-Ling Shyu, Chengcui Zhang, Wal...
VISUALIZATION
2003
IEEE
15 years 5 months ago
Exploring Curved Anatomic Structures with Surface Sections
The extraction of planar sections from volume images is the most commonly used technique for inspecting and visualizing anatomic structures. We propose to generalize the concept o...
Laurent Saroul, Sebastian Gerlach, Roger D. Hersch
COMPGEOM
2003
ACM
15 years 5 months ago
Cost-driven octree construction schemes: an experimental study
Given a scene consisting of objects, ray shooting queries answer with the first object encountered by a given ray, and are used in ray tracing and radiosity for rendering photo-r...
Boris Aronov, Hervé Brönnimann, Allen ...
« Prev « First page 1974 / 2022 Last » Next »