Sciweavers

250 search results - page 25 / 50
» The Art of the Possible
Sort
View
IH
2007
Springer
15 years 3 months ago
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation
The recent decade has seen the emergence of 3D meshes in industrial, medical and entertainment applications. Therefore, their intellectual property protection problem has attracted...
Kai Wang, Guillaume Lavoué, Florence Denis,...
IPPS
2007
IEEE
15 years 4 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
MSS
1999
IEEE
118views Hardware» more  MSS 1999»
15 years 1 months ago
Designing a Self-Maintaining Storage System
This paper shows the suitability of a "self-maintaining" approach to Tertiary Disk, a large-scale disk array system built from commodity components. Instead of incurring...
Satoshi Asami, Nisha Talagala, David A. Patterson
98
Voted
CASES
2005
ACM
14 years 11 months ago
Exploiting pipelining to relax register-file port constraints of instruction-set extensions
Customisable embedded processors are becoming available on the market, thus making it possible for designers to speed up execution of applications by using Application-specific F...
Laura Pozzi, Paolo Ienne
ICAD
2004
14 years 11 months ago
Listening to the Mind Listening
The following explains what mappings have been chosen for a sonification of several data channels from set containing a recording of the neural activity of a person listening to a...
Hans Van Raaij