Sciweavers

1116 search results - page 144 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
IEEEMSP
2002
IEEE
137views Multimedia» more  IEEEMSP 2002»
14 years 23 days ago
Realtime object extraction and tracking with an active camera using image mosaics
—Moving object extraction plays a key role in applications such as object-based videoconference, surveillance, and so on. The difficulties of moving object segmentation lie in th...
Chia-Wen Lin, Chih-Ming Wang, Yao-Jen Chang, Yung-...
ACSAC
2010
IEEE
13 years 5 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
BSN
2009
IEEE
307views Sensor Networks» more  BSN 2009»
14 years 2 months ago
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks
—Wireless sensor-based Body Area Networks (BAN) can play a major role in providing individualized health-care. Given their limited power sources, sensors in BAN have to be energy...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
CMSB
2009
Springer
14 years 2 months ago
Modelling Biological Clocks with Bio-PEPA: Stochasticity and Robustness for the Neurospora crassa Circadian Network
Circadian clocks are biochemical networks, present in nearly all living organisms, whose function is to regulate the expression of specific mRNAs and proteins to synchronise rhyth...
Ozgur E. Akman, Federica Ciocchetta, Andrea Degasp...
SPC
2005
Springer
14 years 1 months ago
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...