Sciweavers

8177 search results - page 1511 / 1636
» Detecting System Emulators
Sort
View
119
Voted
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 7 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
156
Voted
CVPR
2011
IEEE
14 years 7 months ago
How does Person Identity Recognition Help Multi-Person Tracking?
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Cheng-Hao Kuo, Ram Nevatia
139
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
145
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Slice error concealment based on size-adaptive SSIM matching and motion vector outlier rejection
Consecutive corrupted MBs or slice errors are commonly seen in modern video transmission systems. Temporal error concealment is an effective approach to reduce the impact of error...
Hai Gao, Jo Yew Tham, Wei Siong Lee, Kwong Huang G...
128
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Analysis of human footsteps utilizing multi-axial seismic fusion
This paper introduces a method of enhancing an unattended ground sensor (UGS) system’s classification capability of humans via seismic signatures while subsequently discriminati...
Sean Schumer
« Prev « First page 1511 / 1636 Last » Next »