Sciweavers

3705 search results - page 631 / 741
» Building Documentation Generators
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
15 years 1 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
IVS
2008
147views more  IVS 2008»
15 years 1 months ago
Design considerations for collaborative visual analytics
Information visualization leverages the human visual system to support the process of sensemaking, in which information is collected, organized, and analyzed to generate knowledge...
Jeffrey Heer, Maneesh Agrawala
JEI
2008
139views more  JEI 2008»
15 years 1 months ago
Tessella-oriented segmentation and guidelines estimation of ancient mosaic images
Automatic segmentation and analysis of ancient mosaic images can help archaeologists and experts build digital collections and automatically compare mosaics by means of image datab...
Lamia Benyoussef, Stéphane Derrode
JOC
2008
92views more  JOC 2008»
15 years 1 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
79
Voted
JEA
2006
90views more  JEA 2006»
15 years 1 months ago
Heuristics for estimating contact area of supports in layered manufacturing
Layered Manufacturing is a technology that allows physical prototypes of three-dimensional models to be built directly from their digital representation, as a stack of two-dimensi...
Ivaylo Ilinkin, Ravi Janardan, Michiel H. M. Smid,...