Sciweavers

631 search results - page 101 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ENTCS
2008
87views more  ENTCS 2008»
13 years 8 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
JCP
2006
106views more  JCP 2006»
13 years 8 months ago
On the Development of Knowledge Management Services for Collaborative Decision Making
Admitting that the quality of a decision depends on the quality of the knowledge used to make it, it is argued that the enhancement of the decision making efficiency and effectiven...
Christina E. Evangelou, Nikos I. Karacapilidis, Ma...
NN
2006
Springer
101views Neural Networks» more  NN 2006»
13 years 8 months ago
A robot model of the basal ganglia: Behavior and intrinsic processing
The existence of multiple parallel loops connecting sensorimotor systems to the basal ganglia has given rise to proposals that these nuclei serve as a selection mechanism resolvin...
Tony J. Prescott, Fernando M. Montes Gonzál...
PAMI
2006
243views more  PAMI 2006»
13 years 8 months ago
Dynamical Statistical Shape Priors for Level Set-Based Tracking
In recent years, researchers have proposed to introduce statistical shape knowledge into level set based segmentation methods in order to cope with insufficient low-level informati...
Daniel Cremers
SIAMSC
2008
165views more  SIAMSC 2008»
13 years 8 months ago
Iterated Hard Shrinkage for Minimization Problems with Sparsity Constraints
Abstract. A new iterative algorithm for the solution of minimization problems in infinitedimensional Hilbert spaces which involve sparsity constraints in form of p-penalties is pro...
Kristian Bredies, Dirk A. Lorenz