Sciweavers

1511 search results - page 250 / 303
» Active Risk Estimation
Sort
View
ISVC
2009
Springer
14 years 2 months ago
Reconstruction of Facial Shape from Freehand Multi-viewpoint Snapshots
We propose a method that can reconstruct both a 3D facial shape and camera poses from freehand multi-viewpoint snapshots. This method is based on Active Shape Model (ASM) using a f...
Seiji Suzuki, Hideo Saito, Masaaki Mochimaru
IMC
2009
ACM
14 years 2 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 2 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis
ICCCN
2008
IEEE
14 years 2 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
ICIP
2008
IEEE
14 years 2 months ago
Buffer constrained rate control for low bitrate dual-frame video coding
In dual-frame video coding, one long-term reference (LTR) and one short-term reference (STR) frames are used for motion estimation and compensation. In previous work, it was shown...
Mayank Tiwari, Theodore Groves, Pamela C. Cosman