Sciweavers

858 search results - page 12 / 172
» One Is Enough!
Sort
View
INFORMATICALT
2002
118views more  INFORMATICALT 2002»
13 years 8 months ago
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications
Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that ...
Yuh-Min Tseng
TR
2010
126views Hardware» more  TR 2010»
13 years 3 months ago
Approximating a Loading-Dependent Cascading Failure Model With a Branching Process
Abstract--We quantify the closeness of the approximation between two high-level probabilistic models of cascading failure. In one model called CASCADE, failing components successiv...
Janghoon Kim, Ian Dobson
JEI
2007
79views more  JEI 2007»
13 years 8 months ago
Stereo matching via selective multiple windows
Window-based correlation algorithms are widely used for stereo matching due to their computational efficiency as compared to global algorithms. In this paper, a multiple window co...
Satyajit Anil Adhyapak, Nasser D. Kehtarnavaz, Mih...
RE
2004
Springer
14 years 2 months ago
Visual Variability Analysis for Goal Models
One of the benefits of goal-oriented requirements engineering is the possibility of conducting formal analysis in order to evaluate alternative solutions of goal models. Superfici...
Bruno González-Baixauli, Julio Cesar Sampai...
PAMI
2006
126views more  PAMI 2006»
13 years 8 months ago
Estimation of Nonlinear Errors-in-Variables Models for Computer Vision Applications
In an errors-in-variables (EIV) model, all the measurements are corrupted by noise. The class of EIV models with constraints separable into the product of two nonlinear functions, ...
Bogdan Matei, Peter Meer