Sciweavers

452 search results - page 62 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
MICAI
2000
Springer
15 years 1 months ago
Detection and Tracking of Facial Features in Video Sequences
This work presents a real time system for detection and tracking of facial features in video sequences. Such system may be used in visual communication applications, such as teleco...
Rogério Schmidt Feris, Teófilo Em&ia...
IWQOS
2011
Springer
14 years 18 days ago
Adaptive data-driven service integrity attestation for multi-tenant cloud systems
Abstract—Cloud systems provide a cost-effective service hosting infrastructure for application service providers (ASPs). However, cloud systems are often shared by multiple tenan...
Juan Du, Xiaohui Gu, Nidhi Shah
WMCSA
2009
IEEE
15 years 4 months ago
BALANCE: towards a usable pervasive wellness application with accurate activity inference
Technology offers the potential to objectively monitor people‘s eating and activity behaviors and encourage healthier lifestyles. BALANCE is a mobile phone-based system for long...
Tamara Denning, Adrienne H. Andrew, Rohit Chaudhri...
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
15 years 11 months ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 4 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken