Sciweavers

8825 search results - page 1366 / 1765
» All for one or one for all
Sort
View
IJCSA
2006
91views more  IJCSA 2006»
15 years 1 months ago
Possibilistic Explanation
The philosophy literature has been struggling with the problem of defining causality. There has been extensive discussion about it. Hume taught that talk of causation was metaphys...
Sara Boutouhami, Aïcha Mokhtari
IJDE
2006
95views more  IJDE 2006»
15 years 1 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
JACM
2008
91views more  JACM 2008»
15 years 1 months ago
On the minimization of XPath queries
XML queries are usually expressed by means of XPath expressions identifying portions of the selected documents. An XPath expression defines a way of navigating an XML tree and ret...
Sergio Flesca, Filippo Furfaro, Elio Masciari
JCP
2008
119views more  JCP 2008»
15 years 1 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
IVC
2006
120views more  IVC 2006»
15 years 1 months ago
Face recognition by fusing thermal infrared and visible imagery
Thermal infrared (IR) imagery offers a promising alternative to visible imagery for face recognition due to its relative insensitive to variations in face appearance caused by ill...
George Bebis, Aglika Gyaourova, Saurabh Singh, Ioa...
« Prev « First page 1366 / 1765 Last » Next »