Sciweavers

2327 search results - page 264 / 466
» Secure Image Filtering
Sort
View

Publication
283views
14 years 21 days ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
98
Voted
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
CSREASAM
2006
15 years 3 months ago
Firewall Design: Understandable, Designable and Testable
Firewalls are the cornerstones of network security. To make firewalls working effectively, firewall manager must design firewall rules and the rule order correctly. In this paper, ...
Yan-ning Huang, Yong Jiang
128
Voted
WMI
2001
147views more  WMI 2001»
15 years 3 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
ICIP
2006
IEEE
16 years 3 months ago
Model-Free, Statistical Detection and Tracking of Moving Objects
A novel statistical approch for detection and tracking of objects is presented here, which uses both edge and color information in a particle filter. The approach does not need an...
Mark Ross