Sciweavers

159 search results - page 22 / 32
» A Practical Solution to Corner Detection
Sort
View
PET
2010
Springer
14 years 16 days ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
14 years 15 days ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ICCV
2005
IEEE
14 years 10 months ago
Globally Optimal Estimates for Geometric Reconstruction Problems
We introduce a framework for computing statistically optimal estimates of geometric reconstruction problems. While traditional algorithms often suffer from either local minima or ...
Fredrik Kahl, Didier Henrion
ICPR
2004
IEEE
14 years 9 months ago
Multi Feature Path Modeling for Video Surveillance
This paper proposes a novel method for detecting nonconforming trajectories of objects as they pass through a scene. Existing methods mostly use spatial features to solve this pro...
Imran N. Junejo, Mubarak Shah, Omar Javed
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 2 months ago
Security in All-Optical Networks: Self-Organization and Attack Avoidance
—While transparent WDM optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many unique security i...
Jae-Seung Yeom, Ozan K. Tonguz, Gerardo A. Casta&n...