Sciweavers

1497 search results - page 176 / 300
» Online Negative Databases
Sort
View
CCS
2007
ACM
15 years 11 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
ACCV
2006
Springer
15 years 11 months ago
A Local Basis Representation for Estimating Human Pose from Cluttered Images
Recovering the pose of a person from single images is a challenging problem. This paper discusses a bottom-up approach that uses local image features to estimate human upper body p...
Ankur Agarwal, Bill Triggs
142
Voted
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
15 years 10 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke
ECCV
2010
Springer
15 years 10 months ago
Face Liveness Detection from A Single Image with Sparse Low Rank Bilinear Discriminative Model
Spoofing with photograph or video is one of the most common manner to circumvent a face recognition system. In this paper, we present a real-time and non-intrusive method to addre...
MODELS
2009
Springer
15 years 9 months ago
On-the-Fly Construction, Correctness and Completeness of Model Transformations Based on Triple Graph Grammars
Triple graph grammars (TGGs) are a formal and intuitive concept for the specification of model transformations. Their main advantage is an automatic derivation of operational rule...
Hartmut Ehrig, Claudia Ermel, Frank Hermann, Ulrik...