Sciweavers

4511 search results - page 584 / 903
» Observation Based System Security
Sort
View
CCS
2001
ACM
15 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
POPL
2000
ACM
15 years 9 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
CVPR
2003
IEEE
16 years 6 months ago
Learning Dynamics for Exemplar-based Gesture Recognition
This paper addresses the problem of capturing the dynamics for exemplar-based recognition systems. Traditional HMM provides a probabilistic tool to capture system dynamics and in ...
Ahmed M. Elgammal, Vinay D. Shet, Yaser Yacoob, La...
139
Voted
CVPR
2007
IEEE
16 years 6 months ago
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space
Learning from experience is a basic task of human brain that is not yet fulfilled satisfactorily by computers. Therefore, in recent years to cope with this issue, bio-inspired app...
Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni
128
Voted
ISBI
2008
IEEE
16 years 5 months ago
Blind deconvolution for diffraction-limited fluorescence microscopy
Optical Sections of biological samples obtained from a fluorescence Confocal Laser Scanning Microscopes (CLSM) are often degraded by out-of-focus blur and photon counting noise. S...
Praveen Pankajakshan, Bo Zhang, Laure Blanc-F&eacu...