Sciweavers

858 search results - page 37 / 172
» One Is Enough!
Sort
View
WISES
2003
13 years 10 months ago
Adding Hard Real-time Capabilities to CORBA
Abstract — Control systems are often software-intensive applications that are becoming extremely complex as new functionality is required. Complexity is a real engineering challe...
Thomas Losert
MVA
1998
149views Computer Vision» more  MVA 1998»
13 years 10 months ago
Auto-Calibration of a Rotating and Zooming Camera
We propose a method to calibrate a rotating and zooming camera without 3D pattern, where the internal parameters change frame by frame. First, we show that the calibration is uniq...
Yongduek Seo, Ki-Sang Hong
CCS
2010
ACM
13 years 9 months ago
Dismantling SecureMemory, CryptoMemory and CryptoRF
The Atmel chip families SecureMemory, CryptoMemory, and CryptoRF use a proprietary stream cipher to guarantee authenticity, confidentiality, and integrity. This paper describes th...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
CORR
2007
Springer
104views Education» more  CORR 2007»
13 years 8 months ago
Double Clustering and Graph Navigability
Graphs are called navigable if one can find short paths through them using only local knowledge. It has been shown that for a graph to be navigable, its construction needs to mee...
Oskar Sandberg
JSW
2008
164views more  JSW 2008»
13 years 8 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...