Sciweavers

9316 search results - page 119 / 1864
» Analysis of traceback techniques
Sort
View
IDTRUST
2010
ACM
15 years 10 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
ETS
2007
IEEE
81views Hardware» more  ETS 2007»
15 years 10 months ago
Parallel Scan-Like Testing and Fault Diagnosis Techniques for Digital Microfluidic Biochips
Dependability is an important attribute for microfluidic biochips that are used for safety-critical applications such as point-of-care health assessment, air-quality monitoring, a...
Tao Xu, Krishnendu Chakrabarty
143
Voted
CAIP
2007
Springer
152views Image Analysis» more  CAIP 2007»
15 years 10 months ago
Adaptable Model-Based Tracking Using Analysis-by-Synthesis Techniques
Abstract. In this paper we present a novel analysis-by-synthesis approach for real-time camera tracking in industrial scenarios. The camera pose estimation is based on the tracking...
Harald Wuest, Folker Wientapper, Didier Stricker
ICIAR
2007
Springer
15 years 10 months ago
A Fast and Reliable Image Mosaicing Technique with Application to Wide Area Motion Detection
Abstract. Image mosaicing is stirring up a lot of interests in the research community for both its scientific significance and potential spinoff in real world applications. Bein...
Alessandro Bevilacqua, Pietro Azzari
129
Voted
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
15 years 9 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...