Sciweavers

12183 search results - page 97 / 2437
» Computers under Attacks!
Sort
View
USS
2004
15 years 5 months ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on ma...
Umesh Shankar, Monica Chew, J. D. Tygar
CVPR
1998
IEEE
16 years 6 months ago
Illumination Cones for Recognition under Variable Lighting: Faces
Athinodoros S. Georghiades, David J. Kriegman, Pet...
CVPR
1999
IEEE
16 years 6 months ago
Fast, Reliable Head Tracking under Varying Illumination
Marco La Cascia, Stan Sclaroff
ICCV
1999
IEEE
16 years 6 months ago
The Earth Mover's Distance under Transformation Sets
Scott D. Cohen, Leonidas J. Guibas