Sciweavers

935 search results - page 75 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
AVSS
2009
IEEE
13 years 6 months ago
Multimodal Abandoned/Removed Object Detection for Low Power Video Surveillance Systems
Low-cost and low-power video surveillance systems based on networks of wireless video sensors will enter soon the marketplace with the promise of flexibility, quick deployment an...
Michele Magno, Federico Tombari, Davide Brunelli, ...
ACSAC
2009
IEEE
14 years 3 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
ETS
2010
IEEE
140views Hardware» more  ETS 2010»
13 years 10 months ago
Increasing reliability of programmable mixed-signal systems by applying design diversity redundancy
This paper explores the concept of design diversity redundancy applied to mixed-signal (MS) circuit blocks, as a proposal to increase system reliability. Three different implement...
Gabriel de M. Borges, Luiz F. Gonçalves, Ti...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 9 months ago
The System Kato: Detecting Cases of Plagiarism for Answer-Set Programs
Plagiarism detection is a growing need among educational institutions and solutions for different purposes exist. An important field in this direction is detecting cases of source...
Johannes Oetsch, Jörg Pührer, Martin Sch...
HPDC
2007
IEEE
14 years 26 days ago
Transparent network services via a virtual traffic layer for virtual machines
We claim that network services can be transparently added to existing unmodified applications running inside virtual machine environments. Examples of these network services inclu...
John R. Lange, Peter A. Dinda