Sciweavers

144 search results - page 24 / 29
» Hiding privacy information in video surveillance system
Sort
View
CCS
2010
ACM
13 years 8 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
ESWS
2009
Springer
14 years 3 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
ICIP
2007
IEEE
14 years 3 months ago
Group Activity Recognition Based on ARMA Shape Sequence Modeling
In this paper, we propose a system identification approach for group activity recognition in traffic surveillance. Statistical shape theory is used to extract features, and then...
Ying Wang, Kaiqi Huang, Tieniu Tan
ICIP
2004
IEEE
14 years 10 months ago
A motion field reconstruction scheme for smooth boundary video object segmentation
Motion segmentation is a classic and on-going research topic which is an important pre-stage for many video processes. The reliability of the motion field calculation directly dete...
Jean Gao, Ninad Thakoor, Sungyong Jung
APLAS
2009
ACM
14 years 3 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue