Sciweavers

1298 search results - page 211 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
IACR
2011
86views more  IACR 2011»
14 years 1 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
SUTC
2006
IEEE
15 years 8 months ago
DTTC: Delay-Tolerant Trajectory Compression for Object Tracking Sensor Networks
Taking advantage of the delay tolerance for objects tracking sensor networks, we propose delay-tolerant trajectory compression (DTTC) technique, an efficient and accurate algorit...
Yingqi Xu, Wang-Chien Lee
PC
2007
173views Management» more  PC 2007»
15 years 1 months ago
Parallel graphics and visualization
Parallel volume rendering is one of the most efficient techniques to achieve real time visualization of large datasets by distributing the data and the rendering process over a c...
Luís Paulo Santos, Bruno Raffin, Alan Heiri...
PRL
2007
115views more  PRL 2007»
15 years 1 months ago
A decomposition scheme for 3D fuzzy objects based on fuzzy distance information
A decomposition scheme for 3D fuzzy objects is presented. The decomposition is guided by a fuzzy distance transform (FDT) of the fuzzy object and aims to decompose the fuzzy objec...
Stina Svensson
CIKM
2008
Springer
15 years 4 months ago
Mining conceptual graphs for knowledge acquisition
This work addresses the use of computational linguistic analysis techniques for conceptual graphs learning from unstructured texts. A technique including both content mining and i...
Milagros Fernández, Eric Villemonte de la C...