Sciweavers

12183 search results - page 142 / 2437
» Computers under Attacks!
Sort
View
CVPR
2006
IEEE
15 years 11 months ago
A Generalized EM Approach for 3D Model Based Face Recognition under Occlusions
This paper describes an algorithm for pose and illumination invariant face recognition from a single image under occlusions. The method iteratively estimates the parameters of a 3...
Michael De Smet, Rik Fransens, Luc J. Van Gool
WACV
2005
IEEE
15 years 10 months ago
Multiplicative Background-Foreground Estimation Under Uncontrolled Illumination using Intrinsic Images
Instead of the conventional background and foreground definition, we propose a novel method that decomposes a scene into time-varying background and foreground intrinsic images. T...
Fatih Murat Porikli
MOBIHOC
2007
ACM
16 years 4 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
132
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 4 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 4 months ago
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibriu...
Nicolai Kuntze, Dominique Maehler, Andreas U. Schm...