Sciweavers

10608 search results - page 1800 / 2122
» Complexity of O'Hara's Algorithm
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 5 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
NOMS
2002
IEEE
15 years 5 months ago
Message tracking in SOAP-based Web services
As web services become more prevalent, the nature of electronic transactions on the Internet changes from simple browser-to-business clicks to an orchestrated flow of messages bet...
Akhil Sahai, Vijay Machiraju, Jinsong Ouyang, Klau...
111
Voted
WACV
2002
IEEE
15 years 5 months ago
Viewing Enhancement in Video-Endoscopy
Video-endoscopy (Figure 1), a mode of minimally invasive surgery, has proven to be significantly less invasive to the patient. However, it creates a much more complex operation env...
Dan Koppel, Yuan-Fang Wang, Hua Lee
WACV
2002
IEEE
15 years 5 months ago
A Real-time Precrash Vehicle Detection System
— This paper presents an in-vehicle real-time monocular precrash vehicle detection system. The system acquires grey level images through a forward facing low light camera and ach...
Zehang Sun, Ronald Miller, George Bebis, David DiM...
95
Voted
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 5 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
« Prev « First page 1800 / 2122 Last » Next »