Sciweavers

543 search results - page 108 / 109
» Detecting anomalies in data streams using statecharts
Sort
View
JUCS
2008
147views more  JUCS 2008»
13 years 5 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
PREMI
2005
Springer
13 years 11 months ago
Pattern Recognition in Video
Images constitute data that lives in a very high dimensional space, typically of the order of hundred thousand dimensions. Drawing inferences from data of such high dimensions soon...
Rama Chellappa, Ashok Veeraraghavan, Gaurav Aggarw...
TMM
2008
167views more  TMM 2008»
13 years 5 months ago
Mining Appearance Models Directly From Compressed Video
In this paper, we propose an approach to learning appearance models of moving objects directly from compressed video. The appearance of a moving object changes dynamically in vide...
Datong Chen, Qiang Liu, Mingui Sun, Jie Yang
EGH
2010
Springer
13 years 3 months ago
GPU random numbers via the tiny encryption algorithm
Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) a...
Fahad Zafar, Marc Olano, Aaron Curtis
WCNC
2010
IEEE
13 years 3 months ago
Physical Layer Network Coding with Multiple Antennas
: The two-phase MIMO NC (network coding) scheme can be used to boost the throughput in a two-way relay channel in which nodes are equipped with multiple antennas. The obvious strat...
Shengli Zhang, Soung Chang Liew