Sciweavers

283 search results - page 18 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
CVPR
2011
IEEE
12 years 11 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
JCS
2002
94views more  JCS 2002»
13 years 7 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
VLSID
1999
IEEE
102views VLSI» more  VLSID 1999»
13 years 12 months ago
A Low-Power Wireless Camera System
This paper describes the system design of a lowpower wireless camera. A system level approach is used to reduce energy dissipation and maximize battery lifetime. System properties...
Anantha Chandrakasan, Abram P. Dancy, James Goodma...
GREC
2007
Springer
13 years 11 months ago
Building Synthetic Graphical Documents for Performance Evaluation
In this paper we present a system that allows its use to build synthetic graphical documents for the performance evaluation of symbol recognition systems. The key contribution of ...
Mathieu Delalandre, Tony P. Pridmore, Ernest Valve...
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
12 years 11 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig