Sciweavers

34181 search results - page 6445 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
DSN
2004
IEEE
15 years 8 months ago
Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline
The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital...
Nicholas J. Wang, Justin Quek, Todd M. Rafacz, San...
CEAS
2006
Springer
15 years 8 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
EDOC
2004
IEEE
15 years 8 months ago
Notations for the Specification and Verification of Composite Web Services
Availability of a wide variety of Web services over the Internet offers opportunities of providing new value added services built by composing them out of existing ones. Service c...
Simon J. Woodman, Doug J. Palmer, Santosh K. Shriv...
ENC
2004
IEEE
15 years 8 months ago
Virtual Campeche: A Web Based Virtual Three-Dimensional Tour
We present a web-based application that allows a user to, walk through, see, and interact with a fully threedimensional model of an old Mexican city. The city itself motivates thi...
Jiri Zara, Bedrich Benes, Rocio Ruiz-Rodarte
CLOR
2006
15 years 8 months ago
What and Where: 3D Object Recognition with Accurate Pose
Abstract. Many applications of 3D object recognition, such as augmented reality or robotic manipulation, require an accurate solution for the 3D pose of the recognized objects. Thi...
Iryna Gordon, David G. Lowe
« Prev « First page 6445 / 6837 Last » Next »