Sciweavers

364 search results - page 60 / 73
» E-Voting System Security Optimization
Sort
View
CVPR
2007
IEEE
13 years 7 months ago
PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP
Considerable research work has been done in the area of surveillance and biometrics, where the goals have always been high performance, robustness in security and cost optimizatio...
Ankur Chattopadhyay, Terrance E. Boult
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 7 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
TMM
2011
146views more  TMM 2011»
13 years 2 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ISICA
2009
Springer
14 years 1 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
CDC
2008
IEEE
136views Control Systems» more  CDC 2008»
14 years 1 months ago
Distributed hypothesis testing with a fusion center: The conditionally dependent case
Abstract— The paper deals with decentralized Bayesian detection with M hypotheses, and N sensors making conditionally correlated measurements regarding these hypotheses. Each sen...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar