Sciweavers

12183 search results - page 170 / 2437
» Computers under Attacks!
Sort
View
CVPR
2006
IEEE
16 years 7 months ago
Robust Tracking and Stereo Matching under Variable Illumination
Illumination inconsistencies cause serious problems for classical computer vision applications such as tracking and stereo matching. We present a new approach to model illuminatio...
Jingdan Zhang, Leonard McMillan, Jingyi Yu
151
Voted
ICSEA
2006
IEEE
15 years 11 months ago
A Two-Year Software Engineering M.Sc. Degree Designed Under the Bologna Declaration Principles
This paper presents and discusses the syllabus of a second cycle degree on Software Engineering in which any student that finishes any undergraduate Computing degree (Computer Eng...
João M. Fernandes, Ricardo Jorge Machado
IJRR
2008
101views more  IJRR 2008»
15 years 5 months ago
Motion Planning Under Uncertainty for Image-guided Medical Needle Steering
We develop a new motion planning algorithm for a variant of a Dubins car with binary left/right steering and apply it to steerable needles, a new class of flexible beveltip medica...
Ron Alterovitz, Michael S. Branicky, Kenneth Y. Go...
IJNSEC
2011
106views more  IJNSEC 2011»
15 years 21 hour ago
Elliptic Curve Cryptosystems and Side-channel Attacks
In this paper, we present a background on elliptic curve cryptosystems (ECCs) along with the different methods used to compute the scalar multiplication (ECSM), which is the core...
Ekambaram Kesavulu Reddy
HPCN
2000
Springer
15 years 8 months ago
An Analytical Model for a Class of Architectures under Master-Slave Paradigm
We build an analytical model for an application utilizing master-slave paradigm. In the model, only three architecture parameters are used: latency, bandwidth and flop rate. Instea...
Yasemin Yalçinkaya, Trond Steihaug