Sciweavers

211 search results - page 11 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
PERVASIVE
2008
Springer
13 years 7 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
BICOB
2009
Springer
14 years 2 months ago
A Bayesian Approach to High-Throughput Biological Model Generation
Abstract. With the availability of hundreds and soon-to-be thousands of complete genomes, the construction of genome-scale metabolic models for these organisms has attracted much a...
Xinghua Shi, Rick L. Stevens
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
13 years 7 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
LREC
2008
146views Education» more  LREC 2008»
13 years 9 months ago
Lexical Ontology Extraction using Terminology Analysis: Automating Video Annotation
The majority of work described in this paper was conducted as part of the Recovering Evidence from Video by fusing Video Evidence Thesaurus and Video MetaData (REVEAL) project, sp...
Neil Newbold, Bogdan Vrusias, Lee Gillam
CCS
2000
ACM
13 years 12 months ago
Evaluating certificate status information mechanisms
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from aca...
John Iliadis, Diomidis Spinellis, Dimitris Gritzal...