Sciweavers

1611 search results - page 177 / 323
» An Access Control Model for Video Database Systems
Sort
View
PET
2004
Springer
15 years 3 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
CVPR
2009
IEEE
15 years 1 months ago
Switching Gaussian Process Dynamic Models for simultaneous composite motion tracking and recognition
Traditional dynamical systems used for motion tracking cannot effectively handle high dimensionality of the motion states and composite dynamics. In this paper, to address both is...
Jixu Chen, Minyoung Kim, Yu Wang, Qiang Ji
APWEB
2010
Springer
15 years 2 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
ICIP
2008
IEEE
15 years 4 months ago
On optimal royalty costs for video compression
Modern video compression includes a mature set of codecs, tools, and techniques that correspond to a variety of coding efficiencies and royalty costs in video delivery. In early ...
Ankur Saxena, Onur G. Guleryuz, M. Reha Civanlar
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 4 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...