Sciweavers

105 search results - page 16 / 21
» Robust Authentication Using Physically Unclonable Functions
Sort
View
VIS
2004
IEEE
148views Visualization» more  VIS 2004»
14 years 11 months ago
Detection and Visualization of Anomalous Structures in Molecular Dynamics Simulation Data
In this article we explore techniques to detect and visualize features in data from molecular dynamics (MD) simulations. Although the techniques proposed are general, we focus on ...
John Wilkins, Kaden Hazzard, Raghu Machiraju, Same...
POPL
2006
ACM
14 years 10 months ago
The next 700 data description languages
In the spirit of Landin, we present a calculus of dependent types to serve as the semantic foundation for a family of languages called data description languages. Such languages, ...
Kathleen Fisher, Yitzhak Mandelbaum, David Walker
COMCOM
2007
95views more  COMCOM 2007»
13 years 9 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
SIGGRAPH
1995
ACM
14 years 1 months ago
Realistic modeling for facial animation
A major unsolved problem in computer graphics is the construction and animation of realistic human facial models. Traditionally, facial models have been built painstakingly by man...
Yuencheng Lee, Demetri Terzopoulos, Keith Waters
DICTA
2007
13 years 11 months ago
Visual Tracking Based on Color Kernel Densities of Spatial Awareness
We propose a kernel-density based scheme that incorporates the object colors with their spatial relevance to track the object in a video sequence. The object is modeled by the col...
Zhuan Qing Huang, Zhuhan Jiang