Sciweavers

5544 search results - page 1084 / 1109
» Three Inadequate Models
Sort
View
OSN
2008
88views more  OSN 2008»
13 years 7 months ago
Grade-of-service differentiated static resource allocation schemes in WDM networks
This paper presents a study on the Grade-of-Service (GoS) differentiation of static resource allocation in lightpath routed WDM networks, where lightpath requests between node pai...
James Yiming Zhang, Jing Wu, Gregor von Bochmann, ...
GEOINFORMATICA
2007
111views more  GEOINFORMATICA 2007»
13 years 7 months ago
LiDAR-Derived High Quality Ground Control Information and DEM for Image Orthorectification
Orthophotos (or orthoimages if in digital form) have long been recognised as a supplement or alternative to standard maps. The increasing applications of orthoimages require effor...
Xiaoye Liu, Zhenyu Zhang, Jim Peterson, Shobhit Ch...
IJCV
2007
135views more  IJCV 2007»
13 years 7 months ago
Application of the Fisher-Rao Metric to Ellipse Detection
The parameter space for the ellipses in a two dimensional image is a five dimensional manifold, where each point of the manifold corresponds to an ellipse in the image. The parame...
Stephen J. Maybank
SIGPLAN
2008
13 years 7 months ago
An aspect-oriented approach to the undergraduate programming language curriculum
Three key forces are shaping the modern Computer Science (CS) curriculum: (1) new topics/courses are squeezing out existing ones; (2) a focus on "big picture" and interd...
Mark A. Sheldon, Franklyn A. Turbak
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 7 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
« Prev « First page 1084 / 1109 Last » Next »