Sciweavers

43264 search results - page 8230 / 8653
» Comparing models of computation
Sort
View
193
Voted
3DPVT
2004
IEEE
316views Visualization» more  3DPVT 2004»
15 years 7 months ago
A Statistical Method for Robust 3D Surface Reconstruction from Sparse Data
Abstract-General information about a class of objects, such as human faces or teeth, can help to solve the otherwise ill-posed problem of reconstructing a complete surface from spa...
Volker Blanz, Albert Mehl, Thomas Vetter, Hans-Pet...
ACSAC
2004
IEEE
15 years 7 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
151
Voted
ARCS
2004
Springer
15 years 7 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
AMR
2006
Springer
137views Multimedia» more  AMR 2006»
15 years 7 months ago
A General Principled Method for Image Similarity Validation
A novel and general criterion for image similarity validation is introduced using the so-called a contrario decision framework. It is mathematically proved that it is possible to c...
Frédéric Cao, Patrick Bouthemy
161
Voted
CASES
2004
ACM
15 years 7 months ago
Translating affine nested-loop programs to process networks
New heterogeneous multiprocessor platforms are emerging that are typically composed of loosely coupled components that exchange data using programmable interconnections. The compon...
Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere
« Prev « First page 8230 / 8653 Last » Next »