Sciweavers

11603 search results - page 2226 / 2321
» Securing Embedded Systems
Sort
View
TDP
2010
189views more  TDP 2010»
14 years 9 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
CVPR
2011
IEEE
14 years 6 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
128
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
ICASSP
2011
IEEE
14 years 6 months ago
User verification: Matching the uploaders of videos across accounts
This article presents an attempt to link the uploaders of videos based on the audio track of the videos. Using a subset of the MediaEval [10] Placing Task’s Flickr video set, wh...
Howard Lei, Jaeyoung Choi, Adam Janin, Gerald Frie...
CISS
2010
IEEE
14 years 6 months ago
Retrodirective distributed transmit beamforming with two-way source synchronization
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Robert D. Preuss, D. Richard Brown
« Prev « First page 2226 / 2321 Last » Next »