Sciweavers

1461 search results - page 162 / 293
» On Regular Reduced Products
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
HIPEAC
2010
Springer
13 years 7 months ago
Energy and Throughput Efficient Transactional Memory for Embedded Multicore Systems
We propose a new design for an energy-efficient hardware transactional memory (HTM) system for power-aware embedded devices. Prior hardware transactional memory designs proposed a ...
Cesare Ferri, Samantha Wood, Tali Moreshet, R. Iri...
IGARSS
2010
13 years 7 months ago
A filtering approach to improve deformation accuracy using large baseline, low coherence DInSAR phase images
Phase noise in an interferogram hinders the accuracy and reliability of interferometric synthetic aperture radar (InSAR) measurements, including deformation estimation and topogra...
Abduwasit Ghulam, Reda Amer, Robert Ripperdan
HCI
2009
13 years 7 months ago
Interactive Object Segmentation System from a Video Sequence
In this paper, we present an interactive object segmentation system form video, such as TV products and films, for converting 2D to 3D contents. It is focused on reducing the proce...
Guntae Bae, Soo Yeong Kwak, Hyeran Byun
AIL
2010
60views more  AIL 2010»
13 years 6 months ago
Network-based filtering for large email collections in E-Discovery
The information overload in E-Discovery proceedings makes reviewing expensive and it increases the risk of failure to produce results on time and consistently. New interactive tec...
Hans Henseler