Sciweavers

8810 search results - page 1732 / 1762
» Open. Closed. Open
Sort
View
EUROMED
2010
14 years 6 months ago
Capture and Processing of High Resolution 3D-Data of Sutra Inscriptions in China
Modern high resolution 3D-measuring techniques are widely used in quality control and industrial production, because they allow precise and reliable inspection of objects. Their po...
Natalie Schmidt, Frank Boochs, Rainer Schütze
FCSC
2010
238views more  FCSC 2010»
14 years 6 months ago
Knowledge discovery through directed probabilistic topic models: a survey
Graphical models have become the basic framework for topic based probabilistic modeling. Especially models with latent variables have proved to be effective in capturing hidden str...
Ali Daud, Juanzi Li, Lizhu Zhou, Faqir Muhammad
GLOBECOM
2010
IEEE
14 years 6 months ago
Information Epidemics in Complex Networks with Opportunistic Links and Dynamic Topology
Abstract--Wireless networks, especially mobile ad hoc networks (MANET) and cognitive radio networks (CRN), are facing two new challenges beyond traditional random network model: op...
Pin-Yu Chen, Kwang-Cheng Chen
INFSOF
2010
173views more  INFSOF 2010»
14 years 6 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
CCS
2010
ACM
14 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
« Prev « First page 1732 / 1762 Last » Next »