Sciweavers

669 search results - page 80 / 134
» Mastering the Master Theorem
Sort
View
RE
2010
Springer
14 years 4 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
IACR
2011
86views more  IACR 2011»
13 years 9 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
CVPR
2008
IEEE
16 years 42 min ago
Enforcing convexity for improved alignment with constrained local models
Constrained local models (CLMs) have recently demonstrated good performance in non-rigid object alignment/tracking in comparison to leading holistic approaches (e.g., AAMs). A maj...
Yang Wang, Simon Lucey, Jeffrey F. Cohn
MICCAI
2002
Springer
15 years 11 months ago
Experiments with the TER Tele-echography Robot
This paper presents a master-slave system applied to the remote diagnosis from echographic data. The motion of the master manipulator is remotely controlled by a physician and repr...
Adriana Vilchis Gonzales, Jocelyne Troccaz, Philip...
WWW
2006
ACM
15 years 10 months ago
XPath filename expansion in a Unix shell
Locating files based on file system structure, file properties, and maybe even file contents is a core task of the user interface of operating systems. By adapting XPath's po...
Kaspar Giger, Erik Wilde