Sciweavers

12183 search results - page 167 / 2437
» Computers under Attacks!
Sort
View
ICPR
2002
IEEE
16 years 6 months ago
Mobile Robot Localization Under Varying Illumination
Methods for mobile robot localization that use eigenspaces of panoramic snapshots of the environment are in general sensitive to changes in the illumination of the environment. Th...
Matjaz Jogan, Ales Leonardis, Horst Wildenauer, Ho...
DAC
1994
ACM
15 years 9 months ago
RC Interconnect Optimization Under the Elmore Delay Model
An e cient solution to the wire sizing problem WSP usingthe Elmoredelaymodelisproposed. Two formulations of the problem are put forth: in the rst, the minimum interconnect delay i...
Sachin S. Sapatnekar
126
Voted
COMSIS
2010
15 years 1 months ago
Robust moving object detection under complex background
We present a novel method to robustly and efficiently detect moving object, even under the complexity background, such as illumination changes, long shadows etc. This work is disti...
Ding Ying, Wen-Hui Li, Jing-Tao Fan, Hua-Min Yang
PERCOM
2004
ACM
16 years 4 months ago
Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer Interaction
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
D. Scott McCrickard, Christa M. Chewar
ITNG
2008
IEEE
15 years 11 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson