Sciweavers

583 search results - page 94 / 117
» On the Complexity of Matsui's Attack
Sort
View
ICASSP
2008
IEEE
14 years 1 months ago
Collusion-aware traitor tracing in multimedia fingerprinting using sparse signal approximation
We pose the problem of tracing traitors, who have colluded to circumvent a multimedia fingerprinting system, as a sparse underdetermined linear problem. We propose a range of det...
David P. Varodayan, Christine Pépin
ICRA
2008
IEEE
126views Robotics» more  ICRA 2008»
14 years 1 months ago
Towards detection of orthogonal planes in monocular images of indoor environments
— In this paper, we describe the components of a novel algorithm for the extraction of dominant orthogonal planar structures from monocular images taken in indoor environments. T...
Branislav Micusík, Horst Wildenauer, Markus...
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
14 years 1 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
CVPR
2007
IEEE
14 years 1 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon
DSN
2007
IEEE
14 years 1 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...