Sciweavers

311 search results - page 33 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
CCS
2006
ACM
15 years 5 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
CSFW
2011
IEEE
14 years 1 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 7 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...
ICCV
2003
IEEE
15 years 6 months ago
An automatic drowning detection surveillance system for challenging outdoor pool environments
Automatically understanding events happening at a site is the ultimate goal of visual surveillance system. This paper investigates the challenges faced by automated surveillance s...
How-Lung Eng, Kar-Ann Toh, Alvin Harvey Kam, Junxi...
SIGGRAPH
1995
ACM
15 years 5 months ago
Plenoptic modeling: an image-based rendering system
Image-based rendering is a powerful new approach for generating real-time photorealistic computer graphics. It can provide convincing animations without an explicit geometric repr...
Leonard McMillan, Gary Bishop