Sciweavers

524 search results - page 28 / 105
» Why phishing works
Sort
View
ICRA
1998
IEEE
103views Robotics» more  ICRA 1998»
14 years 22 days ago
Person Tracking by Integrating Optical Flow and Uniform Brightness Regions
1 Introducdion of them are based on subtraction his method cannot be applied to camera moves because the backion based method[2] works s, but object tracking is diffithe object ch...
Tsuyoshi Yamane, Yoshiaki Shirai, Jun Miura
INSK
2006
53views more  INSK 2006»
13 years 8 months ago
DRM
In this paper we will discuss the effects that digital rights management has upon the music industry. Whether it hinders the consumers experience and whether there is any actual b...
FASE
2012
Springer
12 years 4 months ago
Cohesive and Isolated Development with Branches
The adoption of distributed version control (DVC), such as Git and Mercurial, in open-source software (OSS) projects has been explosive. Why is this and how are projects using DVC?...
Earl T. Barr, Christian Bird, Peter C. Rigby, Abra...
VLDB
2004
ACM
80views Database» more  VLDB 2004»
14 years 1 months ago
The Case for Precision Sharing
Sharing has emerged as a key idea of static and adaptive stream query processing systems. Inherent in these systems is a tension between sharing common work and avoiding unnecessa...
Sailesh Krishnamurthy, Michael J. Franklin, Joseph...
MICRO
2000
IEEE
68views Hardware» more  MICRO 2000»
14 years 26 days ago
Efficient checker processor design
The design and implementation of a modern microprocessor creates many reliability challenges. Designers must verify the correctness of large complex systems and construct implemen...
Saugata Chatterjee, Christopher T. Weaver, Todd M....