Sciweavers

452 search results - page 80 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
ICS
2003
Tsinghua U.
15 years 2 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
MM
2010
ACM
210views Multimedia» more  MM 2010»
14 years 9 months ago
Increasing interactivity in street view web navigation systems
This paper presents some interactive features we have added on our street-view web navigation application. Our system allows to navigate through a huge amount of data (panoramas a...
Alexandre Devaux, Nicolas Paparoditis
CASES
2005
ACM
14 years 11 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
ICIP
2002
IEEE
15 years 11 months ago
Echocardiogram videos: summarization, temporal segmentation and browsing
In this paper, we present a system for the temporal segmentation, summarization, and browsing of the Echocardiogram videos. Echocardiogram videos are video sequences produced by t...
Shahram Ebadollahi, Shih-Fu Chang, Henry Wu
VR
2008
IEEE
277views Virtual Reality» more  VR 2008»
14 years 9 months ago
Hybrid Feature Tracking and User Interaction for Markerless Augmented Reality
We describe a novel markerless camera tracking approach and user interaction methodology for augmented reality (AR) on unprepared tabletop environments. We propose a real-time sys...
Taehee Lee 0002, Tobias Höllerer