Sciweavers

2575 search results - page 451 / 515
» Providing security with insecure systems
Sort
View
AVSS
2009
IEEE
14 years 9 months ago
Counting People in Groups
Abstract--Cameras are becoming a common tool for automated vision purposes due to their low cost. In an era of growing security concerns, camera surveillance systems have become no...
Duc Fehr, Ravishankar Sivalingam, Vassilios Morell...
EUSFLAT
2009
152views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Fuzzy and PSO Based Algorithm for Driver's Behavior Modeling
The study of human behavior during driving is of primary importance for the improvement of drivers' security. This study is complex because of numerous situations in which the...
Sohrab Khanmohammadi, Mohammad Ali Tinati, Sehrane...
COCOON
2011
Springer
13 years 11 months ago
Finding Paths with Minimum Shared Edges
Motivated by a security problem in geographic information systems, we study the following graph theoretical problem: given a graph G, two special nodes s and t in G, and a number k...
Masoud T. Omran, Jörg-Rüdiger Sack, Hami...
LCTRTS
2009
Springer
15 years 6 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 5 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman