Sciweavers

452 search results - page 67 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
GLOBECOM
2010
IEEE
14 years 7 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
89
Voted
CHI
2004
ACM
15 years 10 months ago
Collision warning design to mitigate driver distraction
As computers and other information technology move into cars and trucks, distraction-related crashes are likely to become an important problem. This paper begins to address this p...
John D. Lee, Joshua D. Hoffman, Elizabeth Hayes
ESCIENCE
2006
IEEE
15 years 3 months ago
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH
Grid systems have a reputation for being difficult to build and use. We describe how the ease of use of the Styx Grid Services (SGS) software can be combined with the security and...
J. D. Blower, K. Haines
MIR
2004
ACM
101views Multimedia» more  MIR 2004»
15 years 3 months ago
Leveraging face recognition technology to find and organize photos
With digital still cameras, users can easily collect thousands of photos. We have created a photo management application with the goal of making photo organization and browsing si...
Andreas Girgensohn, John Adcock, Lynn Wilcox
118
Voted
ICPR
2008
IEEE
15 years 4 months ago
Automatic face and facial features initialization for robust and accurate tracking
Face detection and tracking, through image sequences, are primary steps in many applications such as video surveillance, human computer interface, and expression analysis. Many cu...
Murad Al Haj, Javier Orozco, Jordi Gonzàlez...