Sciweavers

121 search results - page 17 / 25
» Data Assurance in Opaque Computations
Sort
View
ICPR
2004
IEEE
16 years 22 days ago
Model Based Object Recognition by Robust Information Fusion
Given a set of 3D model features and their 2D image, model based object recognition determines the correspondences between those features and hence computes the pose of the object...
Haifeng Chen, Ilan Shimshoni, Peter Meer
93
Voted
ICDCS
2008
IEEE
15 years 6 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
DGO
2011
237views Education» more  DGO 2011»
13 years 11 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...
MOBICOM
2012
ACM
13 years 2 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
ACSAC
2006
IEEE
15 years 5 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra