Sciweavers

6555 search results - page 1241 / 1311
» Secure attribute-based systems
Sort
View
CVPR
2011
IEEE
13 years 1 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
ICASSP
2011
IEEE
13 years 1 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
ICASSP
2011
IEEE
13 years 1 months ago
User verification: Matching the uploaders of videos across accounts
This article presents an attempt to link the uploaders of videos based on the audio track of the videos. Using a subset of the MediaEval [10] Placing Task’s Flickr video set, wh...
Howard Lei, Jaeyoung Choi, Adam Janin, Gerald Frie...
CISS
2010
IEEE
13 years 1 months ago
Retrodirective distributed transmit beamforming with two-way source synchronization
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Robert D. Preuss, D. Richard Brown
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 1 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
« Prev « First page 1241 / 1311 Last » Next »