Sciweavers

2585 search results - page 225 / 517
» computing 1999
Sort
View
ARITH
1999
IEEE
15 years 8 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter
ICCV
1999
IEEE
15 years 8 months ago
Motion Segmentation based on Factorization Method and Discriminant Criterion
A motion segmentation algorithm based on factorization method and discriminant criterion is proposed. This method uses a feature with the most useful similarities for grouping, se...
Naoyuki Ichimura
RAID
1999
Springer
15 years 8 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
STACS
1999
Springer
15 years 8 months ago
Completeness of Neighbourhood Logic
This paper presents a completeness result for a first-order interval temporal logic, called Neighbourhood Logic (NL) which has two neighbourhood modalities. NL can support the spe...
Rana Barua, Suman Roy, Zhou Chaochen
HUC
1999
Springer
15 years 8 months ago
Augmented Workspace: The World as Your Desktop
We live in a three dimensional world, and much of what we do and how we interact in the physical world has a strong spatial component. Unfortunately, most of our interaction with t...
Kelly L. Dempski