Sciweavers

348 search results - page 36 / 70
» Offline firewall analysis
Sort
View
ICDAR
2003
IEEE
15 years 5 months ago
On Machine Understanding of Online Handwritten Mathematical Expressions
This paper aims at automatic recognition of online handwritten mathematical expressions written on an electronic tablet. The proposed technique involves two major stages: symbol r...
Utpal Garain, B. B. Chaudhuri
DDECS
2007
IEEE
175views Hardware» more  DDECS 2007»
15 years 6 months ago
Analyzing Test and Repair Times for 2D Integrated Memory Built-in Test and Repair
—An efficient on-chip infrastructure for memory test and repair is crucial to enhance yield and availability of SoCs. A commonly used repair strategy is to equip memories with sp...
Philipp Öhler, Sybille Hellebrand, Hans-Joach...
DSS
2006
149views more  DSS 2006»
14 years 11 months ago
A metadatabase-enabled executive information system (Part A): A flexible and adaptable architecture
Executive information systems (EIS) that are capable of accessing multiple data sources (both online and offline) for ondemand, ad hoc analysis are needed to support the changing ...
Waiman Cheung, Gilbert Babin
SEMWEB
2004
Springer
15 years 5 months ago
Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment
In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing thes...
Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers,...
CCS
2010
ACM
15 years 27 days ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...