Sciweavers

15379 search results - page 41 / 3076
» Protecting users from
Sort
View
TON
2010
196views more  TON 2010»
13 years 2 months ago
Fast Recovery From Dual-Link or Single-Node Failures in IP Networks Using Tunneling
Abstract--This paper develops novel mechanisms for recovering from failures in IP networks with proactive backup path calculations and IP tunneling. The primary scheme provides res...
Shrinivasa Kini, S. Ramasubramanian, Amund Kvalbei...
AAAI
2007
13 years 10 months ago
KA-CAPTCHA: An Opportunity for Knowledge Acquisition on the Web
Any Web user is a potential knowledge contributor, but it remains a challenge to make them devote their time contributing to some purpose. In order to align individual with social...
Bruno Norberto da Silva, Ana Cristina Bicharra Gar...
ICPR
2010
IEEE
13 years 5 months ago
Discriminating Intended Human Objects in Consumer Videos
In a consumer video, there are not only intended objects, which are intentionally captured by the camcorder user, but also unintended objects, which are accidentally framed-in. Sin...
Hiroshi Uegaki, Yuta Nakashima, Noboru Babaguchi
HOTOS
2003
IEEE
14 years 28 days ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
SEC
2008
13 years 9 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans