Sciweavers

144227 search results - page 28719 / 28846
» Using the
Sort
View
TCSV
2010
14 years 9 months ago
Quad-Tree Motion Modeling With Leaf Merging
In this paper, we are concerned with the modeling of motion between frames of a video sequence. Typically, it is not possible to represent the motion between frames by a single mod...
Reji Mathew, David S. Taubman
TDP
2010
166views more  TDP 2010»
14 years 9 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
TDSC
2010
119views more  TDSC 2010»
14 years 9 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
TE
2010
89views more  TE 2010»
14 years 9 months ago
An Electrical Engineering Summer Academy for Middle School and High School Students
The Electrical Engineering Summer Academy for Pre-College Students was held at the University of Tulsa from June 11th through June 15th , 2007. Of the 20 students accepted, 19 par...
Peter LoPresti, Theodore W. Manikas, Jeff Kohlbeck
TIFS
2010
130views more  TIFS 2010»
14 years 9 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
« Prev « First page 28719 / 28846 Last » Next »