Sciweavers

1527 search results - page 166 / 306
» Demographic information flows
Sort
View
150
Voted
TVCG
2012
203views Hardware» more  TVCG 2012»
13 years 7 months ago
Morse Set Classification and Hierarchical Refinement Using Conley Index
—Morse decomposition provides a numerically stable topological representation of vector fields that is crucial for their rigorous interpretation. However, Morse decomposition is ...
Guoning Chen, Qingqing Deng, Andrzej Szymczak, Rob...
USS
2008
15 years 7 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
CSFW
1999
IEEE
15 years 9 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
WORM
2004
15 years 6 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
CVPR
2009
IEEE
16 years 11 months ago
Capturing Multiple Illumination Conditions using Time and Color Multiplexing
Many vision and graphics problems such as relighting, structured light scanning and photometric stereo, need im- ages of a scene under a number of different illumination conditi...
Bert De Decker (Hasselt University), Jan Kautz (Un...