Sciweavers

80 search results - page 13 / 16
» Inference Attacks on Location Tracks
Sort
View
CHI
2010
ACM
13 years 11 months ago
Where is my team: supporting situation awareness with tactile displays
A group of friends visiting a crowded and noisy music festival is an example of a situation where knowing the location of other people is important, but where external factors, su...
Martin Pielot, Oliver Krull, Susanne Boll
ICCV
2007
IEEE
14 years 9 months ago
The Best of Both Worlds: Combining 3D Deformable Models with Active Shape Models
Reliable 3D tracking is still a difficult task. Most parametrized 3D deformable models rely on the accurate extraction of image features for updating their parameters, and are pro...
Christian Vogler, Zhiguo Li, Atul Kanaujia, Siome ...
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 7 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
WCRE
2005
IEEE
14 years 29 days ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean