Sciweavers

1553 search results - page 240 / 311
» Talking Faces - Technologies and Applications
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
AMDO
2006
Springer
14 years 1 months ago
Combined Head, Lips, Eyebrows, and Eyelids Tracking Using Adaptive Appearance Models
The ability to detect and track human heads and faces in video sequences is useful in a great number of applications, such as human-computer interaction and gesture recognition. Re...
Fadi Dornaika, Javier Orozco, Jordi Gonzàle...
DATE
2004
IEEE
102views Hardware» more  DATE 2004»
14 years 1 months ago
High Security Smartcards
New consumer appliances such as PDA, Set Top Box, GSM/UMTS terminals enable an easy access to the internet and strongly contribute to the development of ecommerce and m-commerce s...
Marc Renaudin, G. Fraidy Bouesse, Ph. Proust, J. P...
DSN
2004
IEEE
14 years 1 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
CP
2006
Springer
14 years 1 months ago
Stochastic Allocation and Scheduling for Conditional Task Graphs in MPSoCs
This paper describes a complete and efficient solution to the stochastic allocation and scheduling for Multi-Processor System-on-Chip (MPSoC). Given a conditional task graph charac...
Michele Lombardi, Michela Milano