Sciweavers

6318 search results - page 38 / 1264
» Data Leakage Detection
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Coarse-to-Fine Pedestrian Localization and Silhouette Extraction for the Gait Challenge Data Sets
This paper presents a localized coarse-to-fine algorithm for efficient and accurate pedestrian localization and silhouette extraction for the Gait Challenge data sets. The coars...
Haiping Lu, Konstantinos N. Plataniotis, Anastasio...
WAPCV
2004
Springer
15 years 5 months ago
Visual Attention for Object Recognition in Spatial 3D Data
In this paper, we present a new recognition system for the fast detection and classification of objects in spatial 3D data. The system consists of two main components: A biologic...
Simone Frintrop, Andreas Nüchter, Hartmut Sur...
ISCAS
2007
IEEE
94views Hardware» more  ISCAS 2007»
15 years 6 months ago
Fundamental Bounds on Power Reduction during Data-Retention in Standby SRAM
Abstract— We study leakage-power reduction in standby random access memories (SRAMs) during data-retention. An SRAM cell requires a minimum critical supply voltage (DRV) above wh...
Animesh Kumar, Huifang Qin, Prakash Ishwar, Jan M....
SACMAT
2011
ACM
14 years 2 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
IPPS
2009
IEEE
15 years 6 months ago
Using hardware transactional memory for data race detection
Abstract—Widespread emergence of multicore processors will spur development of parallel applications, exposing programmers to degrees of hardware concurrency hitherto unavailable...
Shantanu Gupta, Florin Sultan, Srihari Cadambi, Fr...