Sciweavers

3907 search results - page 775 / 782
» Information requirements engineering for data warehouse syst...
Sort
View
INFOCOM
2005
IEEE
15 years 7 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
RAID
2004
Springer
15 years 7 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
NIPS
1998
15 years 3 months ago
Learning to Estimate Scenes from Images
We seek the scene interpretation that best explains image data. For example, we may want to infer the projected velocities (scene) which best explain two consecutive image frames ...
William T. Freeman, Egon C. Pasztor
PAMI
2006
358views more  PAMI 2006»
15 years 1 months ago
Recovering 3D Human Pose from Monocular Images
We describe a learning based method for recovering 3D human body pose from single images and monocular image sequences. Our approach requires neither an explicit body model nor pri...
Ankur Agarwal, Bill Triggs
CCS
2009
ACM
15 years 8 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...