Sciweavers

1466 search results - page 15 / 294
» Completeness of the Authentication Tests
Sort
View
MICCAI
2005
Springer
14 years 1 months ago
Automatic 4-D Registration in Dynamic MR Renography Based on Over-Complete Dyadic Wavelet and Fourier Transforms
Dynamic contrast-enhanced 4-D MR renography has the potential for broad clinical applications, but suffers from respiratory motion that limits analysis and interpretation. Since ea...
Ting Song, Vivian S. Lee, Henry Rusinek, Manmeen K...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 7 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 23 days ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
IACR
2011
87views more  IACR 2011»
12 years 7 months ago
Untangling RFID Privacy Models
This article investigates privacy in Radio Frequency IDentification (RFID) systems. We survey the eight most well-known RFID privacy models. We examine their advantages and drawba...
Iwen Coisel, Tania Martin
ECCV
2004
Springer
14 years 1 months ago
Authentic Emotion Detection in Real-Time Video
Abstract. There is a growing trend toward emotional intelligence in humancomputer interaction paradigms. In order to react appropriately to a human, the computer would need to have...
Yafei Sun, Nicu Sebe, Michael S. Lew, Theo Gevers