Sciweavers

34 search results - page 4 / 7
» Tamper Proofing 3D Models
Sort
View
TNN
2010
233views Management» more  TNN 2010»
14 years 4 months ago
A hierarchical RBF online learning algorithm for real-time 3-D scanner
In this paper, a novel real-time online network model is presented. It is derived from the hierarchical radial basis function (HRBF) model and it grows by automatically adding unit...
Stefano Ferrari, Francesco Bellocchio, Vincenzo Pi...
67
Voted
ISCAS
2006
IEEE
121views Hardware» more  ISCAS 2006»
15 years 3 months ago
Microelectromechanical systems in 3D SOI-CMOS: sensing electronics embedded in mechanical structures
— We discuss the design of CMOS MEMS in a 3D SOI-CMOS technology. We present layout architectures, preliminary mechanics modeling using finite element analysis and release proce...
Francisco Tejada, Andreas G. Andreou
CVPR
2007
IEEE
15 years 11 months ago
Change Detection in a 3-d World
This paper examines the problem of detecting changes in a 3-d scene from a sequence of images, taken by cameras with arbitrary but known pose. No prior knowledge of the state of n...
Thomas Pollard, Joseph L. Mundy
87
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
14 years 9 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 4 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar