Sciweavers

8 search results - page 2 / 2
» Nothing Ventured, Nothing Gained
Sort
View
HOST
2008
IEEE
15 years 6 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
INTERNET
2008
150views more  INTERNET 2008»
14 years 11 months ago
RPC and REST: Dilemma, Disruption, and Displacement
straction and explained how the Representational State Transfer (REST) architectural style is one alternative that can yield a superior approach to building distributed systems. Be...
Steve Vinoski
ECCV
2008
Springer
16 years 1 months ago
Differential Spatial Resection - Pose Estimation Using a Single Local Image Feature
Robust local image features have been used successfully in robot localization and camera pose estimation; region tracking using affine warps is considered state of the art also for...
Kevin Köser, Reinhard Koch