Sciweavers

5665 search results - page 39 / 1133
» Introduction to Computer Security
Sort
View
CVPR
1997
IEEE
14 years 1 months ago
Uncalibrated 1D projective camera and 3D affine reconstruction of lines
We describe a linear algorithm to recover 30 afJine slzape/niotionfrom line correspondences over three views with uncalibrated afine cameras. The key idea is the introduction of a...
Long Quan
HAIS
2010
Springer
13 years 10 months ago
Fusion of Fuzzy Spatial Relations
Spatial relations are essential for understanding the image configuration and modeling common sense knowledge. In most of existing methods, topological, directional and distance s...
Nadeem Salamat, El-hadi Zahzah
FSTTCS
2010
Springer
13 years 6 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
IASTEDSE
2004
13 years 10 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis

Book
358views
15 years 7 months ago
Java for the Beginning Programmer
"Java for the Beginning Programmer teaches Java to someone with absolutely no programming background. This book focuses on core programming topics such as variables, looping, ...
Jeff Heaton