Sciweavers

1585 search results - page 148 / 317
» Automatically optimizing secure computation
Sort
View
GPC
2007
Springer
14 years 12 hour ago
Bio-inspired Grid Information System with Epidemic Tuning
g Service Oriented Abstractions for the Wireless Sensor Grid Edgardo Aviles-Lopez, J. Antonio Garcia-Macias Implementation of OSD Security Framework and Credential Cache Gu Su Kim,...
Agostino Forestiero, Carlo Mastroianni, Fausto Pup...
ICCV
2005
IEEE
14 years 1 months ago
HMM Based Falling Person Detection Using Both Audio and Video
Automatic detection of a falling person in video is an important problem with applications in security and safety areas including supportive home environments and CCTV surveillance...
B. Ugur Töreyin, Yigithan Dedeoglu, A. Enis &...
IPSN
2009
Springer
14 years 2 months ago
Automating rendezvous and proxy selection in sensornets
As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We in...
David Chu, Joseph M. Hellerstein
SACMAT
2009
ACM
14 years 2 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
CCS
2005
ACM
14 years 1 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough