Sciweavers

637 search results - page 97 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
FDL
2005
IEEE
15 years 3 months ago
Meta Modelling of Embedded Systems using Active Databases
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Dieter Monjau, Mathias Sporer
99
Voted
ICCV
2005
IEEE
15 years 3 months ago
A Joint System for Person Tracking and Face Detection
Abstract. Visual detection and tracking of humans in complex scenes is a challenging problem with a wide range of applications, for example surveillance and human-computer interact...
ZhenQiu Zhang, Gerasimos Potamianos, Andrew W. Sen...
ICW
2005
IEEE
209views Communications» more  ICW 2005»
15 years 3 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
65
Voted
ISPD
2005
ACM
133views Hardware» more  ISPD 2005»
15 years 3 months ago
Multi-bend bus driven floorplanning
In this paper, the problem of bus-driven floorplanning is addressed. Given a set of blocks and the bus specification (the width of each bus and the blocks that the bus need to g...
Jill H. Y. Law, Evangeline F. Y. Young
IWDW
2005
Springer
15 years 3 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...