Sciweavers

3134 search results - page 411 / 627
» Computing full disjunctions
Sort
View
102
Voted
IACR
2011
86views more  IACR 2011»
14 years 9 days ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
301
Voted

Publication
279views
16 years 10 months ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain
ANCS
2008
ACM
15 years 2 months ago
Implementing an OpenFlow switch on the NetFPGA platform
We describe the implementation of an OpenFlow Switch on the NetFPGA platform. OpenFlow is a way to deploy experimental or new protocols in networks that carry production traffic. ...
Jad Naous, David Erickson, G. Adam Covington, Guid...
94
Voted
CVPR
1998
IEEE
16 years 2 months ago
Elliptical Head Tracking Using Intensity Gradients and Color Histograms
An algorithm for tracking a person's head is presented. The head's projection onto the image plane is modeled as an ellipse whose position and size are continually updat...
Stan Birchfield
CVPR
2004
IEEE
16 years 2 months ago
Hybrid Textons: Modeling Surfaces with Reflectance and Geometry
The appearance of surface texture as it varies with angular changes of view and illumination is becoming an increasingly important research topic. The bidirectional texture functi...
Jing Wang 0008, Kristin J. Dana