Sciweavers

1585 search results - page 51 / 317
» Automatically optimizing secure computation
Sort
View
JMM2
2007
122views more  JMM2 2007»
13 years 7 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
ACSAC
2002
IEEE
14 years 25 days ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
CAD
2012
Springer
12 years 3 months ago
Flexible shape control for automatic resizing of apparel products
We provide a flexible shape control technique in this paper for the automatic resizing of apparel products. The automatic resizing function has become an essential part of the 3D...
Yuwei Meng, Charlie C. L. Wang, Xiaogang Jin
WS
2006
ACM
14 years 1 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
DBSEC
1996
125views Database» more  DBSEC 1996»
13 years 9 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi