Sciweavers

12183 search results - page 149 / 2437
» Computers under Attacks!
Sort
View
131
Voted
JRTIP
2006
119views more  JRTIP 2006»
15 years 4 months ago
Achieving real-time object detection and tracking under extreme conditions
In this survey, we present a brief analysis of single camera object detection and tracking methods. We also give a comparison of their computational complexities. These methods ar...
Fatih Porikli
210
Voted
QUESTA
2011
14 years 11 months ago
Large number of queues in tandem: Scaling properties under back-pressure algorithm
Abstract We consider a system with N unit-service-rate queues in tandem, with exogenous arrivals of rate λ at queue 1, under a back-pressure (MaxWeight) algorithm: service at queu...
Alexander L. Stolyar
EUROCRYPT
2000
Springer
15 years 8 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
ALGORITHMICA
2006
77views more  ALGORITHMICA 2006»
15 years 5 months ago
Scalable Parallel Algorithms for FPT Problems
Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems o...
Faisal N. Abu-Khzam, Michael A. Langston, Pushkar ...
PERVASIVE
2007
Springer
15 years 11 months ago
Inference Attacks on Location Tracks
Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough experiment to assess the effectiveness of either. We ex...
John Krumm