Sciweavers

3162 search results - page 545 / 633
» Transformations for semi-continuous data
Sort
View
114
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
AIPR
2005
IEEE
15 years 6 months ago
Hyperspectral Detection Algorithms: Operational, Next Generation, on the Horizon
Abstract—The multi-band target detection algorithms implemented in hyperspectral imaging systems represent perhaps the most successful example of image fusion. A core suite of su...
A. Schaum
ECBS
2005
IEEE
160views Hardware» more  ECBS 2005»
15 years 6 months ago
Traceability-Driven Model Refinement for Test Case Generation
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...
Matthias Riebisch, Michael Hübner
100
Voted
GLVLSI
2005
IEEE
122views VLSI» more  GLVLSI 2005»
15 years 6 months ago
Thermal aware cell-based full-chip electromigration reliability analysis
A hierarchical scheme with cells and modules is crucial for managing design complexity during a large integrated circuit design. We present a methodology for thermal aware cell-ba...
Syed M. Alam, Donald E. Troxel, Carl V. Thompson
ICCV
2005
IEEE
15 years 6 months ago
Inference of Non-Overlapping Camera Network Topology by Measuring Statistical Dependence
We present an approach for inferring the topology of a camera network by measuring statistical dependence between observations in different cameras. Two cameras are considered con...
Kinh Tieu, Gerald Dalley, W. Eric L. Grimson