Sciweavers

329 search results - page 20 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
FUIN
2000
100views more  FUIN 2000»
13 years 7 months ago
The Watershed Transform: Definitions, Algorithms and Parallelization Strategies
The watershed transform is the method of choice for image segmentation in the field of mathematical morphology. We present a critical review of several definitions of the watershed...
Jos B. T. M. Roerdink, Arnold Meijster
WETICE
2006
IEEE
14 years 1 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
ENGL
2007
98views more  ENGL 2007»
13 years 7 months ago
Synergies of Three Letters Syndrome for Revitalizing Manufacturing
— Research on Just-in-Time (JIT), Total Quality Management (TQM), Total Productive Maintenance (TPM), Supply Chain Management (SCM), and Theory of Constraints (TOC) generally inv...
M. A. Venkatesh, Vishnu D. Wakchaure, Shrikant P. ...
ICALT
2003
IEEE
14 years 29 days ago
Speech Enabled E-Learning for Adult Literacy Tutoring
It is estimated in a recent OECD International Adult Literacy Survey that up to 500,000 Irish adults are functionally illiterate, that is many people have difficulty in reading an...
Paul Walsh, Jason Meade
DEXAW
1999
IEEE
103views Database» more  DEXAW 1999»
13 years 12 months ago
Applying Temporal Databases to Geographical Data Analysis
This paper reports an experience in which a temporal database was used to analyze the results of a survey on human behaviors and displacements in a ski resort. This survey was par...
Marie-Christine Fauvet, S. Chardonnel, Marlon Duma...