نتایج جستجو برای: the shadow

تعداد نتایج: 16054280  

Ali Saeidi Rashkolia Masoud Hadian Dehkordi Mohammad Mahdi Zahedi,

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

Journal: :EMBO reports 2011

Journal: :Academic Medicine 2017

Evaluation of vegetation cover by using the remote sensing data can provide enhanced results with less time and expense. In this paper, we propose a new automatic algorithm for detection of vegetation and shadow regions in high-resolution satellite/aerial images. It uses only color channels of the image and involves two modeling and evaluation phases. In the modeling phase, after extracting col...

2003
Murali R. Varanasi

In 1998, the Association for Computing Machinery (ACM) and the Computer Society of the Institute for Electrical and Electronic Engineers (IEEE-CS) convened a joint curriculum task force called Computing Curricula 2001, or CC2001 for short. The final report is planned to be organized into five volumes: Volume I: Overview, Volume II: Computer Science, Volume III: Computer Engineering, Volume IV: ...

2015
N. M. Salih M. Kadhim M. T. Bray

Very-High-Resolution (VHR) satellite imagery is a powerful source of data for detecting and extracting information about urban constructions. Shadow in the VHR satellite imageries provides vital information on urban construction forms, illumination direction, and the spatial distribution of the objects that can help to further understanding of the built environment. However, to extract shadows,...

2005
Kostas G. Anagnostakis Stelios Sidiroglou Periklis Akritidis Konstantinos Xinidis Evangelos P. Markatos Angelos D. Keromytis

We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a “shadow honeypot” to determine the accuracy of the anomaly prediction. The shadow is an instance of the pro...

2009
Kostas G. Anagnostakis Stelios Sidiroglou Periklis Akritidis Michalis Polychronakis Angelos D. Keromytis Evangelos P. Markatos

We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network or service. Traffic that is considered anomalous is processed by a “shadow honeypot” to determine the accuracy of the anomaly prediction. The shadow is an instance of the ...

2007
Daniel Scherzer Stefan Jeschke Michael Wimmer

Shadow mapping suffers from spatial aliasing (visible as blocky shadows) as well as temporal aliasing (visible as flickering). Several methods have already been proposed for reducing such artifacts, but so far none is able to provide satisfying results in real time. This paper extends shadow mapping by reusing information of previously rasterized images, stored efficiently in a so-called histor...

Journal: :Index on Censorship 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید