Sciweavers

2648 search results - page 54 / 530
» Human Factors In Computer Security
Sort
View
CVPR
2010
IEEE
15 years 3 months ago
Contour People: A Parameterized Model of 2D Articulated Human Shape
We define a new “contour person” model of the human body that has the expressive power of a detailed 3D model and the computational benefits of a simple 2D part-based model....
Oren Freifeld, Alex Weiss, Silvia Zuffi, Michael B...
ICMCS
2008
IEEE
211views Multimedia» more  ICMCS 2008»
15 years 4 months ago
A real-time video surveillance system with human occlusion handling using nonlinear regression
This paper presents a real-time single-camera surveillance system, aiming at detecting and partly analyzing a group of people. A set of moving persons is segmented using a combina...
Jungong Han, Minwei Feng, Peter H. N. de With
DBSEC
2008
136views Database» more  DBSEC 2008»
14 years 11 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
BMCBI
2010
106views more  BMCBI 2010»
14 years 10 months ago
A computational evaluation of over-representation of regulatory motifs in the promoter regions of differentially expressed genes
Background: Observed co-expression of a group of genes is frequently attributed to co-regulation by shared transcription factors. This assumption has led to the hypothesis that pr...
Guofeng Meng, Axel Mosig, Martin Vingron
JERIC
2006
68views more  JERIC 2006»
14 years 9 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop