Sciweavers

452 search results - page 34 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
CHI
2007
ACM
15 years 10 months ago
Multiview: improving trust in group video conferencing through spatial faithfulness
Video conferencing is still considered a poor alternative to face-to-face meetings. In the business setting, where these systems are most prevalent, the misuse of video conferenci...
David T. Nguyen, John Canny
RAID
2005
Springer
15 years 3 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
CN
2004
256views more  CN 2004»
14 years 9 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
MVA
2007
174views Computer Vision» more  MVA 2007»
14 years 11 months ago
A Real-Time Hand Gesture Interface Implemented on a Multi-Core Processor
This paper describes a real-time hand gesture recognition system and its application to VCR remote control. Cascaded classifiers are used to detect a number of different hand pose...
Tsukasa Ike, Nobuhisa Kishikawa, Björn Stenge...
SIGOPSE
2004
ACM
15 years 3 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase