Sciweavers

5451 search results - page 985 / 1091
» On very high degrees
Sort
View
EIT
2008
IEEE
14 years 3 months ago
Architectural support for securing application data in embedded systems
—The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the sy...
Olga Gelbart, Eugen Leontie, Bhagirath Narahari, R...
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Futures of EU-Based eGovernment: A Scenario-Based Exploration
The future of eGovernment is very uncertain and requires to be approached by depicting different scenario in which a wide range of contextual factors, such as social, cultural, in...
Patrick van der Duin, Noor Huijboom
IAT
2008
IEEE
14 years 3 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
ICASSP
2008
IEEE
14 years 3 months ago
Joint tracking and video registration by factorial Hidden Markov models
Tracking moving objects from image sequences obtained by a moving camera is a difficult problem since there exists apparent motion of the static background. It becomes more dif...
Xue Mei, Fatih Murat Porikli
ICASSP
2008
IEEE
14 years 3 months ago
Outage capacity of a cooperative scheme with binary input and a simple relay
Cooperative communications is a rapidly evolving research area. Most of the cooperative protocols that have appeared in the literature assume slow flat fading channels and Gaussi...
George N. Karystinos, Athanasios P. Liavas