Sciweavers

883 search results - page 110 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
118
Voted
IEEESP
2007
98views more  IEEESP 2007»
15 years 2 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
EDBTW
2010
Springer
15 years 9 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
SAC
2008
ACM
15 years 2 months ago
ECG data provisioning for telehomecare monitoring
The latest computer and communication technologies in combination with an enhanced ECG analysis system can be used to improve cardiac patient's follow-up out-of-hospital. In ...
Bernardo Gonçalves, José Gonç...
ICCV
2007
IEEE
16 years 4 months ago
Differential EMD Tracking
Illumination changes cause object appearance to change drastically and many existing tracking algorithms lack the capability to handle this problem. The Earth Mover's Distanc...
Qi Zhao, Shane Brennan, Hai Tao
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
15 years 9 months ago
Accurate Palmprint Recognition Using Spatial Bags of Local Layered Descriptors
Abstract. State-of-the-art palmprint recognition algorithms achieve high accuracy based on component based texture analysis. However, they are still sensitive to local variations o...
Yufei Han, Tieniu Tan, Zhenan Sun