Sciweavers

67 search results - page 5 / 14
» A Quantitative Approach to Reductions in Secure Computation
Sort
View
DAC
2007
ACM
14 years 8 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
CCS
2007
ACM
14 years 1 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 5 days ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
ICPR
2008
IEEE
14 years 8 months ago
Segmentation by combining parametric optical flow with a color model
We present a simple but efficient model for object segmentation in video scenes that integrates motion and color information in a joint probabilistic framework. Optical flow is mo...
Adrian Ulges, Thomas M. Breuel
IPMI
2009
Springer
14 years 8 months ago
4D MAP Image Reconstruction Incorporating Organ Motion
Abstract. Four-dimensional respiratory correlated computed tomography (4D RCCT) has been widely used for studying organ motion. Most current algorithms use binning techniques which...
Jacob Hinkle, P. Thomas Fletcher, Brian Wang, Bill...