Sciweavers

87 search results - page 13 / 18
» Publicly Detectable Techniques for the Protection of Virtual...
Sort
View
PLDI
2006
ACM
15 years 3 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
AVSS
2007
IEEE
15 years 4 months ago
Towards robust face recognition for Intelligent-CCTV based surveillance using one gallery image
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
ICMI
2005
Springer
164views Biometrics» more  ICMI 2005»
15 years 3 months ago
A user interface framework for multimodal VR interactions
This article presents a User Interface (UI) framework for multimodal interactions targeted at immersive virtual environments. Its configurable input and gesture processing compon...
Marc Erich Latoschik
VLDB
2005
ACM
90views Database» more  VLDB 2005»
15 years 3 months ago
Tuning Schema Matching Software using Synthetic Scenarios
Most recent schema matching systems assemble multiple components, each employing a particular matching technique. The domain user must then tune the system: select the right compo...
Mayssam Sayyadian, Yoonkyong Lee, AnHai Doan, Arno...
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 1 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania