Sciweavers

1548 search results - page 209 / 310
» Estimating Software Vulnerabilities
Sort
View
CCE
2011
14 years 6 months ago
Cell-based dynamic heat exchanger models - Direct determination of the cell number and size
Large amounts of thermal energy are transferred to for heating or cooling in the industry as well as in the other sectors. Typical examples are crude oil preheating, ethylene plan...
Petar Sabev Varbanov, Jirí Jaromír K...
SIAMIS
2011
14 years 6 months ago
Continuous Primal-Dual Methods for Image Processing
In this article we study a continuous Primal-Dual method proposed by Appleton and Talbot and generalize it to other problems in image processing. We interpret it as an Arrow-Hurwi...
M. Goldman
TASE
2010
IEEE
14 years 6 months ago
Surface Patch Reconstruction From "One-Dimensional" Tactile Data
This paper studies the reconstruction of unknown curved surfaces through finger tracking. A patch can be generated from tactile data points along three concurrent surface curves un...
Yan-Bin Jia, Jiang Tian
DAC
2011
ACM
13 years 11 months ago
TPM-SIM: a framework for performance evaluation of trusted platform modules
This paper presents a simulation toolset for estimating the impact of Trusted Platform Modules (TPMs) on the performance of applications that use TPM services, especially in multi...
Jared Schmitz, Jason Loew, Jesse Elwell, Dmitry Po...
PAMI
2012
13 years 1 months ago
Nonlinear Shape Registration without Correspondences
—In this paper, we propose a novel framework to estimate the parameters of a diffeomorphism that aligns a known shape and its distorted observation. Classical registration method...
Csaba Domokos, Jozsef Nemeth, Zoltan Kato