Sciweavers

162 search results - page 17 / 33
» Secure video processing: Problems and challenges
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Voice convergin: Speaker de-identification by voice transformation
Speaker identification might be a suitable answer to prevent unauthorized access to personal data. However we also need to provide solutions to secure transmission of spoken infor...
Qin Jin, Arthur R. Toth, Tanja Schultz, Alan W. Bl...
AVSS
2005
IEEE
14 years 1 months ago
Performance evaluation of event detection solutions: the CREDS experience
In video surveillance projects, automatic and realtime event detection solutions are required to guarantee an efficient and cost-effective use of the infrastructure. Many solution...
Francesco Ziliani, Sergio A. Velastin, Fatih Porik...
MM
2005
ACM
166views Multimedia» more  MM 2005»
14 years 29 days ago
MedSMan: a streaming data management system over live multimedia
Querying live media streams is a challenging problem that is becoming an essential requirement in a growing number of applications. Research in multimedia information systems has ...
Bin Liu, Amarnath Gupta, Ramesh Jain
HUC
2010
Springer
13 years 8 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
13 years 8 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...