Sciweavers

3134 search results - page 411 / 627
» Computing full disjunctions
Sort
View
IACR
2011
86views more  IACR 2011»
12 years 10 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf

Publication
279views
15 years 8 months ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain
ANCS
2008
ACM
14 years 23 days ago
Implementing an OpenFlow switch on the NetFPGA platform
We describe the implementation of an OpenFlow Switch on the NetFPGA platform. OpenFlow is a way to deploy experimental or new protocols in networks that carry production traffic. ...
Jad Naous, David Erickson, G. Adam Covington, Guid...
CVPR
1998
IEEE
15 years 24 days ago
Elliptical Head Tracking Using Intensity Gradients and Color Histograms
An algorithm for tracking a person's head is presented. The head's projection onto the image plane is modeled as an ellipse whose position and size are continually updat...
Stan Birchfield
CVPR
2004
IEEE
15 years 24 days ago
Hybrid Textons: Modeling Surfaces with Reflectance and Geometry
The appearance of surface texture as it varies with angular changes of view and illumination is becoming an increasingly important research topic. The bidirectional texture functi...
Jing Wang 0008, Kristin J. Dana