Sciweavers

4719 search results - page 822 / 944
» Applications = Components GLoo
Sort
View
WCE
2007
13 years 10 months ago
Nonstationary Inverse Source Problem of Active Shielding
—The problem of active shielding of some domains from the effect of the sources distributed in other domains is considered. The problem can be formulated either in a bounded dom...
S. V. Utyuzhnikov
WCE
2007
13 years 10 months ago
Face Recognition using Discrete Cosine Transform plus Linear Discriminant Analysis
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
M. Hajiarbabi, J. Askari, S. Sadri, M. Saraee
ATAL
2010
Springer
13 years 10 months ago
Intelligent agents for the smart grid
The Intelligent Decentralised Energy-Aware Systems (iDEaS) project at the University of Southampton (see www.ideasproject.info) is developing and demonstrating the application of ...
Perukrishnen Vytelingum, Thomas Voice, Sarvapali D...
ESORICS
2010
Springer
13 years 10 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
HPDC
2010
IEEE
13 years 10 months ago
Fast and scalable simulation of volunteer computing systems using SimGrid
Advances in internetworking technology and the decreasing cost-performance ratio of commodity computing components have enabled Volunteer Computing (VC). VC platforms aggregate te...
Bruno Donassolo, Henri Casanova, Arnaud Legrand, P...