Sciweavers

2990 search results - page 460 / 598
» Thresholding for Change Detection
Sort
View
CJ
2004
93views more  CJ 2004»
15 years 3 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
CN
2004
106views more  CN 2004»
15 years 3 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
CPHYSICS
2004
93views more  CPHYSICS 2004»
15 years 3 months ago
Kinetic and dynamic Delaunay tetrahedralizations in three dimensions
We describe algorithms to implement fully dynamic and kinetic three-dimensional unconstrained Delaunay triangulations, where the time evolution of the triangulation is not only go...
Gernot Schaller, Michael Meyer-Hermann
CSCW
2000
ACM
15 years 3 months ago
A Knowledge-based Approach to Handling Exceptions in Workflow Systems
This paper describes a novel knowledge-based approach for helping workflow process designers and participants better manage the exceptions (deviations from an ideal collaborative ...
Mark Klein, Chrysanthos Dellarocas
JMIV
2002
78views more  JMIV 2002»
15 years 3 months ago
A Deformable Template Model, with Special Reference to Elliptical Templates
This paper suggests a high-level continuous image model for planar star-shaped objects. Under this model, a planar object is a stochastic deformation of a star-shaped template. The...
Asger Hobolth, Jan Pedersen, Eva B. Vedel Jensen