Sciweavers

581 search results - page 68 / 117
» formats 2006
Sort
View
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 7 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
IJON
2007
88views more  IJON 2007»
13 years 7 months ago
Self-organisation can generate the discontinuities in the somatosensory map
The primary somatosensory cortex contains a topographic map of the body surface, with two notable discontinuities — the representation of the face is next to that of the hands, ...
Tom Stafford, Stuart P. Wilson
IJMMS
2000
70views more  IJMMS 2000»
13 years 7 months ago
Computer generation of process explanations in nuclear astrophysics
In this paper we describe Astra, a computational aid for generating process explanations in nuclear astrophysics. The system operates in two stages, the rst using knowledge of qua...
Sakir Kocabas, Pat Langley
NRHM
2000
55views more  NRHM 2000»
13 years 7 months ago
The link vs. the event: activating and deactivating elements in time-based hypermedia
Activation and deactivation of media items plays a fundamental role in the playing of multimedia and time-based hypermedia presentations. Activation and deactivation information t...
Lynda Hardman, Patrick Schmitz, Jacco van Ossenbru...
PAMI
2000
127views more  PAMI 2000»
13 years 7 months ago
Geometric Camera Calibration Using Circular Control Points
Modern CCD cameras are usually capable of a spatial accuracy greater than 1/50 of the pixel size. However, such accuracy is not easily attained due to various error sources that c...
Janne Heikkilä