Sciweavers

1737 search results - page 184 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CAD
2000
Springer
15 years 4 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
143
Voted
ICDAR
2007
IEEE
15 years 11 months ago
A Bayesian Network Approach to Mode Detection for Interactive Maps
This paper describes a mode detection system for online pen input that employs a Bayesian network to combine classification results and context information. Previous monolithic c...
Don Willems, Louis Vuurpijl
CORR
2007
Springer
81views Education» more  CORR 2007»
15 years 5 months ago
Throughput Scaling Laws for Wireless Networks with Fading Channels
—A network of n communication links, operating over a shared wireless channel, is considered. Fading is assumed to be the dominant factor affecting the strength of the channels b...
Masoud Ebrahimi, Mohammad Ali Maddah-Ali, Amir K. ...
ICIP
2009
IEEE
15 years 2 months ago
Eye reflection analysis and application to display-camera calibration
We present a novel technique for calibrating display-camera systems from reflections in the user's eyes. Display-camera systems enable a range of vision applications that nee...
Christian Nitschke, Atsushi Nakazawa, Haruo Takemu...
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
15 years 9 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...