Sciweavers

178 search results - page 32 / 36
» Self-adaptive Security at Application Level: a Proposal
Sort
View
ICIP
2007
IEEE
14 years 9 months ago
Three Dimensional Face Recognition using Wavelet Decomposition of Range Images
Interest in face recognition systems has increased significantly due to the emergence of significant commercial opportunities in surveillance and security applications. In this pa...
Sina Jahanbin, Hyohoon Choi, Alan C. Bovik, Kennet...
VLDB
2005
ACM
151views Database» more  VLDB 2005»
14 years 1 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
14 years 23 days ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...
NSF
2001
Springer
225views Computer Vision» more  NSF 2001»
13 years 12 months ago
Content-Based Networking: A New Communication Infrastructure
Abstract. We argue that the needs of many classes of modern applications, especially those targeted at mobile or wireless computing, demand the services of content-based publish/su...
Antonio Carzaniga, Alexander L. Wolf
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
13 years 11 months ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi