Sciweavers

185 search results - page 34 / 37
» A Metrics Framework to Drive Application Security Improvemen...
Sort
View
OOPSLA
2004
Springer
15 years 2 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
TIFS
2008
149views more  TIFS 2008»
14 years 9 months ago
Using One-Class SVMs and Wavelets for Audio Surveillance
This paper presents a procedure aimed at recognizing environmental sounds for surveillance and security applications. We propose to apply One-Class Support Vector Machines (1-SVMs...
Asma Rabaoui, Manuel Davy, Stéphane Rossign...
AUSAI
2003
Springer
15 years 2 months ago
Towards Automated Creation of Image Interpretation Systems
Abstract. Automated image interpretation is an important task in numerous applications ranging from security systems to natural resource inventorization based on remote-sensing. Re...
Ilya Levner, Vadim Bulitko, Lihong Li, Greg Lee, R...
SI3D
2003
ACM
15 years 2 months ago
Interruptible rendering
Interruptible rendering is a novel approach to the fidelity-versusperformance tradeoff ubiquitous in real-time rendering. Interruptible rendering unifies spatial error, caused by ...
Cliff Woolley, David P. Luebke, Benjamin Watson, A...
76
Voted
DSN
2009
IEEE
15 years 4 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...