Sciweavers

6293 search results - page 1009 / 1259
» Information Flow Testing
Sort
View
CRV
2005
IEEE
134views Robotics» more  CRV 2005»
15 years 10 months ago
Segment-Based Hand Pose Estimation
The work presented here solves two major problems of hand pose recognition: (A) determining what pose is shown in a given, input picture and (B) detecting the presence of a known ...
Christopher Schwarz, Niels da Vitoria Lobo
137
Voted
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 10 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 10 months ago
The Mobile Internet: The Pioneering Users' Adoption Decisions
Substantial financial and technological investments by private and public organizations have resulted in the delivery of the third generation mobile technologies, although the jou...
Ann Fogelgren-Pedersen
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
15 years 10 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo
ICDCSW
2005
IEEE
15 years 10 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
« Prev « First page 1009 / 1259 Last » Next »