Sciweavers

631 search results - page 106 / 127
» Intrusion-Resilient Secure Channels
Sort
View
ICCV
2005
IEEE
15 years 5 months ago
HMM Based Falling Person Detection Using Both Audio and Video
Automatic detection of a falling person in video is an important problem with applications in security and safety areas including supportive home environments and CCTV surveillance...
B. Ugur Töreyin, Yigithan Dedeoglu, A. Enis &...
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 5 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
ISI
2005
Springer
15 years 5 months ago
Selective Fusion for Speaker Verification in Surveillance
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
Yosef A. Solewicz, Moshe Koppel
SIGOPSE
2004
ACM
15 years 5 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
CONCUR
2001
Springer
15 years 4 months ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini