Sciweavers

1809 search results - page 114 / 362
» Weakly Computable Real Numbers
Sort
View
IWAN
2004
Springer
15 years 9 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
AUSFORENSICS
2004
15 years 5 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
127
Voted
CVPR
2006
IEEE
15 years 10 months ago
Regression-based Hand Pose Estimation from Multiple Cameras
The RVM-based learning method for whole body pose estimation proposed by Agarwal and Triggs is adapted to hand pose recovery. To help overcome the difficulties presented by the g...
Teófilo Emídio de Campos, David W. M...
RT
1998
Springer
15 years 8 months ago
Fidelity of Graphics Reconstructions: A Psychophysical Investigation
In this paper we develop a technique for measuring the perceptual equivalence of a graphical scene to a real scene. Ability to compare images is valuable in computer graphics for a...
Ann McNamara, Alan Chalmers, Tom Troscianko, Erik ...
ICPR
2008
IEEE
15 years 10 months ago
Scale-invariant density-based clustering initialization algorithm and its application
In this paper, we bring out a new density-based clustering initialization algorithm which is invariant to the scale factor. Instead of using the scale factor while the cluster ini...
Chunsheng Hua, Ryusuke Sagawa, Yasushi Yagi