Sciweavers

497 search results - page 38 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
HVEI
2009
15 years 2 months ago
A perceptual evaluation of 3D unsharp masking
Much research has gone into developing methods for enhancing the contrast of displayed 3D scenes. In the current study, we investigated the perceptual impact of an algorithm recen...
Matthias Ihrke, Tobias Ritschel, Kaleigh Smith, Th...
ACSAC
2003
IEEE
15 years 9 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
TRUST
2009
Springer
15 years 11 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
ICAC
2007
IEEE
15 years 10 months ago
An Autonomic Service Discovery Mechanism to Support Pervasive Device Accessing Semantic Grid
An important challenge of integrating pervasive devices into Grid environment to enhance pervasive device capabilities is that pervasive devices need to locate, find, select and ...
Tao Guan, Ed Zaluska, David De Roure
ICIP
2009
IEEE
16 years 5 months ago
An Algorithm For Automatic Skin Smoothing In Digital Portraits
We describe an automatic method for beautifying digital portraits by smoothing the skin of the face. The method builds on existing face detection and face feature alignment techno...