Sciweavers

739 search results - page 62 / 148
» Security Challenges in Cloud Computing
Sort
View
ICCV
2009
IEEE
15 years 1 months ago
The Normalized Subspace Inclusion: Robust clustering of motion subspaces
Perceiving dynamic scenes of rigid bodies, through affine projections of moving 3D point clouds, boils down to clustering the rigid motion subspaces supported by the points' ...
Nuno Pinho da Silva, João Paulo Costeira
134
Voted
ICCV
2009
IEEE
15 years 1 months ago
Video scene categorization by 3D hierarchical histogram matching
In this paper we present a new method for categorizing video sequences capturing different scene classes. This can be seen as a generalization of previous work on scene classifica...
Paritosh Gupta, Sai Sankalp Arrabolu, Mathew Brown...
ITNG
2007
IEEE
15 years 10 months ago
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...
125
Voted
CCS
2005
ACM
15 years 9 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
147
Voted
WISA
2004
Springer
15 years 9 months ago
Secure and Efficient AES Software Implementation for Smart Cards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks,...
Elena Trichina, Lesya Korkishko