Sciweavers

3451 search results - page 577 / 691
» Collaborative attack modeling
Sort
View
ICMCS
2005
IEEE
218views Multimedia» more  ICMCS 2005»
14 years 1 months ago
A Mid-level Visual Concept Generation Framework for Sports Analysis
The development of mid-level concepts helps to bridge the gap between low-level feature and high-level semantics in video analysis. Most existing work combines the customized mid-...
Xiaofeng Tong, Lingyu Duan, Hanqing Lu, Changsheng...
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
14 years 1 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
SEFM
2005
IEEE
14 years 1 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider
STORAGESS
2005
ACM
14 years 1 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
STORAGESS
2005
ACM
14 years 1 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo