Sciweavers

631 search results - page 58 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
SCALESPACE
2009
Springer
15 years 8 months ago
A Non-local Approach to Shape from Ambient Shading
We study the mathematical and numerical aspects of the estimation of the 3-D shape of a Lambertian scene seen under diffuse illumination. This problem is known as “shape from amb...
Emmanuel Prados, Nitin Jindal, Stefano Soatto
109
Voted
HPDC
2006
IEEE
15 years 7 months ago
Motor: A Virtual Machine for High Performance Computing
High performance application development remains challenging, particularly for scientists making the transition to a Grid environment. In general areas of computing, virtual envir...
Wojtek Goscinski, David Abramson
SECPERU
2006
IEEE
15 years 7 months ago
Service-Oriented Security Architecture for CII based on Sensor Networks
The extraordinary growth of the Information Society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well ...
Javier Lopez, José A. Montenegro, Rodrigo R...
ACSAC
2005
IEEE
15 years 7 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels
GLVLSI
2005
IEEE
133views VLSI» more  GLVLSI 2005»
15 years 7 months ago
Generating decision regions in analog measurement spaces
We develop a neural network that learns to separate the nominal from the faulty instances of a circuit in a measurement space. We demonstrate that the required separation boundari...
Haralampos-G. D. Stratigopoulos, Yiorgos Makris