Sciweavers

669 search results - page 80 / 134
» Mastering the Master Theorem
Sort
View
136
Voted
RE
2010
Springer
14 years 10 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
130
Voted
IACR
2011
86views more  IACR 2011»
14 years 3 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
118
Voted
CVPR
2008
IEEE
16 years 5 months ago
Enforcing convexity for improved alignment with constrained local models
Constrained local models (CLMs) have recently demonstrated good performance in non-rigid object alignment/tracking in comparison to leading holistic approaches (e.g., AAMs). A maj...
Yang Wang, Simon Lucey, Jeffrey F. Cohn
129
Voted
MICCAI
2002
Springer
16 years 4 months ago
Experiments with the TER Tele-echography Robot
This paper presents a master-slave system applied to the remote diagnosis from echographic data. The motion of the master manipulator is remotely controlled by a physician and repr...
Adriana Vilchis Gonzales, Jocelyne Troccaz, Philip...
101
Voted
WWW
2006
ACM
16 years 4 months ago
XPath filename expansion in a Unix shell
Locating files based on file system structure, file properties, and maybe even file contents is a core task of the user interface of operating systems. By adapting XPath's po...
Kaspar Giger, Erik Wilde