Sciweavers

3134 search results - page 411 / 627
» Computing full disjunctions
Sort
View
119
Voted
IACR
2011
86views more  IACR 2011»
14 years 2 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
326
Voted

Publication
279views
17 years 14 days ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain
ANCS
2008
ACM
15 years 4 months ago
Implementing an OpenFlow switch on the NetFPGA platform
We describe the implementation of an OpenFlow Switch on the NetFPGA platform. OpenFlow is a way to deploy experimental or new protocols in networks that carry production traffic. ...
Jad Naous, David Erickson, G. Adam Covington, Guid...
108
Voted
CVPR
1998
IEEE
16 years 4 months ago
Elliptical Head Tracking Using Intensity Gradients and Color Histograms
An algorithm for tracking a person's head is presented. The head's projection onto the image plane is modeled as an ellipse whose position and size are continually updat...
Stan Birchfield
125
Voted
CVPR
2004
IEEE
16 years 4 months ago
Hybrid Textons: Modeling Surfaces with Reflectance and Geometry
The appearance of surface texture as it varies with angular changes of view and illumination is becoming an increasingly important research topic. The bidirectional texture functi...
Jing Wang 0008, Kristin J. Dana