Sciweavers

860 search results - page 84 / 172
» Face Detection on Embedded Systems
Sort
View
ACSAC
2002
IEEE
14 years 2 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
IROS
2006
IEEE
135views Robotics» more  IROS 2006»
14 years 3 months ago
Probabilistic Speaker Localization in Noisy Environments by Audio-Visual Integration
Abstract - In this paper, we have developed not only a probabilistic sound localization system including VAD (Voice Activity Detection) component using three microphones but also a...
JongSuk Choi, Munsang Kim, Hyun-Don Kim
CODES
2007
IEEE
14 years 3 months ago
A data protection unit for NoC-based architectures
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
TC
2008
13 years 9 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
RTAS
1997
IEEE
14 years 22 days ago
Efficient Run-Time Monitoring of Timing Constraints
A real-time system operates under timing constraints which it may be unable to meet under some circumstances. The criticality of a timing constraint determines how a system is to ...
Aloysius K. Mok, Guangtian Liu