Sciweavers

3370 search results - page 572 / 674
» Correlation Embedding Analysis
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
IBPRIA
2007
Springer
14 years 4 months ago
Handwritten Symbol Recognition by a Boosted Blurred Shape Model with Error Correction
One of the major difficulties of handwriting recognition is the variability among symbols because of the different writer styles. In this paper we introduce the boosting of blurre...
Alicia Fornés, Sergio Escalera, Josep Llad&...
IESS
2007
Springer
92views Hardware» more  IESS 2007»
14 years 4 months ago
An Interactive Model Re-Coder for Efficient SoC Specification
To overcome the complexity in System-on-Chip (SoC) design, researchers have developed sophisticated design flows that significantly reduce the development time through automation...
Pramod Chandraiah, Rainer Dömer
SCIA
2007
Springer
119views Image Analysis» more  SCIA 2007»
14 years 4 months ago
Watertight Multi-view Reconstruction Based on Volumetric Graph-Cuts
This paper proposes a fast 3D reconstruction approach for efficiently generating watertight 3D models from multiple short baseline views. Our method is based on the combination of...
Mario Sormann, Christopher Zach, Joachim Bauer, Ko...
UCS
2007
Springer
14 years 4 months ago
Using Auction Based Group Formation for Collaborative Networking in Ubicomp
In many Ubicomp scenarios tiny wireless embedded sensor devices are used, and devices often collaborate to accomplish a common goal. This paper presents a group formation method de...
Christian Decker, Emilian Peev, Till Riedel, Marti...