Sciweavers

171 search results - page 34 / 35
» Privacy intrusion detection using dynamic Bayesian networks
Sort
View
CVPR
2010
IEEE
14 years 6 months ago
Action Unit Detection with Segment-based SVMs
Automatic facial action unit (AU) detection from video is a long-standing problem in computer vision. Two main approaches have been pursued: (1) static modeling--typically posed a...
Tomas Simon, Nguyen Minh, Fernando De la Torre, Je...
NDSS
2008
IEEE
14 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
STORAGESS
2005
ACM
14 years 3 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
PERVASIVE
2009
Springer
14 years 4 months ago
Methodologies for Continuous Cellular Tower Data Analysis
This paper presents novel methodologies for the analysis of continuous cellular tower data from 215 randomly sampled subjects in a major urban city. We demonstrate the potential of...
Nathan Eagle, John A. Quinn, Aaron Clauset
ICCV
2007
IEEE
14 years 11 months ago
A Scalable Approach to Activity Recognition based on Object Use
We propose an approach to activity recognition based on detecting and analyzing the sequence of objects that are being manipulated by the user. In domains such as cooking, where m...
Jianxin Wu, Adebola Osuntogun, Tanzeem Choudhury, ...