Sciweavers

1663 search results - page 43 / 333
» Computer Security in the Real World
Sort
View
CVPR
2007
IEEE
14 years 9 months ago
Automatic texture mapping on real 3D model
We propose a full automatic technique to project virtual texture on a real textureless 3D object. Our sytem is composed of cameras and projector and are used to determine the pose...
Molinier Thierry, David Fofi, Patrick Gorria, Joaq...
MDM
2005
Springer
127views Communications» more  MDM 2005»
14 years 1 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
EMSOFT
2003
Springer
14 years 25 days ago
Emerging Trends in Adaptive Middleware and Its Application to Distributed Real-Time Embedded Systems
Embedded systems have become prevalent in today’s computing world and more and more of these embedded systems are highly distributed and network centric. This adds increasing deg...
Joseph P. Loyall
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell