Sciweavers

5128 search results - page 93 / 1026
» When Abstraction Fails
Sort
View
ICIAP
2007
ACM
16 years 4 months ago
A Framework for False Positive Suppression in Video Segmentation
Object detection in video surveillance is typically done through background subtraction or temporal differencing. While these techniques perform very well under scenes where there...
Min Han Tun, Geoff A. W. West, Tele Tan
ICSE
2003
IEEE-ACM
16 years 4 months ago
A Model and a Design Approach to Building QoS Adaptive Systems
The paper introduces a system model called the probabilistic asynchronous model which characterises the context in which many practical and the Internet-based applications are bui...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
PERCOM
2005
ACM
16 years 4 months ago
Securing Wireless Networks in a University Environment
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Jochen Eisinger, Peter Winterer, Bernd Becker
CCS
2009
ACM
15 years 11 months ago
Mixed-initiative security agents
Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge, and require...
Rachel Greenstadt, Sadia Afroz, Michael Brennan
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 11 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...