Sciweavers

1804 search results - page 171 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
EUROCRYPT
2012
Springer
13 years 6 months ago
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
We present a new approach for creating chosen ciphertext secure encryption. The focal point ork is a new abstraction that we call Detectable Chosen Ciphertext Security (DCCA). Int...
Susan Hohenberger, Allison B. Lewko, Brent Waters
ASPLOS
2011
ACM
14 years 8 months ago
Improving the performance of trace-based systems by false loop filtering
Trace-based compilation is a promising technique for language compilers and binary translators. It offers the potential to expand the compilation scopes that have traditionally be...
Hiroshige Hayashizaki, Peng Wu, Hiroshi Inoue, Mau...
FGR
2000
IEEE
193views Biometrics» more  FGR 2000»
15 years 9 months ago
Robust 3D Head Tracking Under Partial Occlusion
This paper describes a novel system for 3D head tracking under partial occlusion from 2D monocular image sequences. In this system, The Extended Superquadric (ESQ) is used to gene...
Ye Zhang, Chandra Kambhamettu
PAA
2010
14 years 11 months ago
Multiple Condensation filters for road detection and tracking
In this paper, we present a novel and robust road tracking system for vision-based personal navigation. Novelty of the work includes the use of multiple Condensation filters to tra...
Li Bai, Yan Wang, Michael C. Fairhurst
PAM
2007
Springer
15 years 10 months ago
Leveraging BitTorrent for End Host Measurements
Traditional methods of conducting measurements to end hosts require sending unexpected packets to measurement targets. Although existing techniques can ascertain end host character...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...