Sciweavers

10608 search results - page 1800 / 2122
» Complexity of O'Hara's Algorithm
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 10 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
108
Voted
NOMS
2002
IEEE
15 years 10 months ago
Message tracking in SOAP-based Web services
As web services become more prevalent, the nature of electronic transactions on the Internet changes from simple browser-to-business clicks to an orchestrated flow of messages bet...
Akhil Sahai, Vijay Machiraju, Jinsong Ouyang, Klau...
WACV
2002
IEEE
15 years 10 months ago
Viewing Enhancement in Video-Endoscopy
Video-endoscopy (Figure 1), a mode of minimally invasive surgery, has proven to be significantly less invasive to the patient. However, it creates a much more complex operation env...
Dan Koppel, Yuan-Fang Wang, Hua Lee
WACV
2002
IEEE
15 years 10 months ago
A Real-time Precrash Vehicle Detection System
— This paper presents an in-vehicle real-time monocular precrash vehicle detection system. The system acquires grey level images through a forward facing low light camera and ach...
Zehang Sun, Ronald Miller, George Bebis, David DiM...
152
Voted
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 10 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
« Prev « First page 1800 / 2122 Last » Next »