Sciweavers

1548 search results - page 210 / 310
» Estimating Software Vulnerabilities
Sort
View
PAMI
2012
13 years 1 months ago
Monocular 3D Reconstruction of Locally Textured Surfaces
— Most recent approaches to monocular non-rigid 3D shape recovery rely on exploiting point correspondences and work best when the whole surface is well-textured. The alternative ...
Aydin Varol, Appu Shaji, Mathieu Salzmann, Pascal ...
COMPSAC
2007
IEEE
15 years 5 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
ICPP
2007
IEEE
15 years 5 months ago
Tempest: A portable tool to identify hot spots in parallel code
Compute clusters are consuming more power at higher densities than ever before. This results in increased thermal dissipation, the need for powerful cooling systems, and ultimatel...
Kirk W. Cameron, Hari K. Pyla, Srinidhi Varadaraja...
AUIC
2006
IEEE
15 years 5 months ago
A markerless registration method for augmented reality based on affine properties
This paper presents a markerless registration approach for Augmented Reality (AR) systems based on the Kanade-Lucas-Tomasi (KLT) natural feature tracker and the affine reconstruct...
Y. Pang, M. L. Yuan, Andrew Y. C. Nee, Soh-Khim On...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 5 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...