Sciweavers

919 search results - page 130 / 184
» Efficient computation of view subsets
Sort
View
ISBI
2008
IEEE
14 years 10 months ago
Distributed online anomaly detection in high-content screening
This paper presents an automated, online approach to anomaly detection in high-content screening assays for pharmaceutical research. Online detection of anomalies is attractive be...
Adam Goode, Rahul Sukthankar, Lily B. Mummert, Mei...
CVPR
2009
IEEE
14 years 4 months ago
Catadioptric Projectors
We present a catadioptric projector analogous to a catadioptric camera by combining a commodity digital projector with additional optical units. We show that, by using specially sh...
Yuanyuan Ding, Jing Xiao, Kar-Han Tan, Jingyi Yu
ACSAC
1999
IEEE
14 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 1 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
ARC
2010
Springer
183views Hardware» more  ARC 2010»
13 years 10 months ago
Integrated Design Environment for Reconfigurable HPC
Using FPGAs to accelerate High Performance Computing (HPC) applications is attractive, but has a huge associated cost: the time spent, not for developing efficient FPGA code but fo...
Lilian Janin, Shoujie Li, Doug Edwards