Sciweavers

1296 search results - page 13 / 260
» Multiplicative Background Risk
Sort
View
CN
2008
126views more  CN 2008»
14 years 9 months ago
Graph transformation approaches for diverse routing in shared risk resource group (SRRG) failures
Failure resilience is a desired feature of the Internet. Most traditional restoration architectures assume single-failure assumption, which is not adequate in present day WDM opti...
Pallab Datta, Arun K. Somani
CVPR
2006
IEEE
15 years 3 months ago
3D Reconstruction of Background and Objects Moving on Ground Plane Viewed from a Moving Camera
We present a novel method to obtain a 3D Euclidean reconstruction of both the background and moving objects in a video sequence. We assume that, multiple objects are moving rigidl...
Chang Yuan, Gérard G. Medioni
CCGRID
2005
IEEE
15 years 3 months ago
Mapping DAG-based applications to multiclusters with background workload
Before an application modelled as a Directed Acyclic Graph (DAG) is executed on a heterogeneous system, a DAG mapping policy is often enacted. After mapping, the tasks (in the DAG...
Ligang He, Stephen A. Jarvis, Daniel P. Spooner, D...
SP
2002
IEEE
110views Security Privacy» more  SP 2002»
14 years 9 months ago
Optical Time-Domain Eavesdropping Risks of CRT Displays
A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time c...
Markus G. Kuhn
PET
2004
Springer
15 years 2 months ago
Electromagnetic Eavesdropping Risks of Flat-Panel Displays
Electromagnetic eavesdropping of computer displays – first demonstrated to the general public by van Eck in 1985 – is not restricted to cathode-ray tubes. Modern flat-panel d...
Markus G. Kuhn