Sciweavers

1265 search results - page 143 / 253
» Better Burst Detection
Sort
View
SECRYPT
2008
107views Business» more  SECRYPT 2008»
13 years 11 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
MVA
2007
112views Computer Vision» more  MVA 2007»
13 years 11 months ago
A Physics-Based Imaging Model of Scanning Electron Microscopes
This paper discusses a physics-based imaging model of scanning electron microscopes (SEM). The purpose is to accurately examine the imaging process of a SEM, which has to be neces...
Kousuke Kamada, Takayuki Okatani, Koichiro Deguchi
DLOG
2004
13 years 11 months ago
Using Non-Primitive Concept Definitions for Improving DL-based Knowledge Bases
Medical Terminological Knowledge Bases contain a large number of primitive concept definitions. This is due to the large number of natural kinds that are represented, and due to t...
Ronald Cornet, Ameen Abu-Hanna
IASTEDSE
2004
13 years 11 months ago
Does active guidance improve software inspections? A preliminary empirical study
Inspections are an established quality assurance technique. In order to optimize the inspection approach, different reading techniques, such as checklist-based reading and scenari...
Christian Denger, Marcus Ciolkowski, Filippo Lanub...
DICTA
2003
13 years 11 months ago
Image Ownership Verification via Private Pattern and Watermarking Wavelet Filters
Abstract. In this paper, we propose a watermarking scheme for the image ownership verification in terms of a private key pattern and wavelet filters. The watermarking is mainly ach...
Zhuan Qing Huang, Zhuhan Jiang