Sciweavers

881 search results - page 59 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
AMC
2005
218views more  AMC 2005»
15 years 1 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
MOBISYS
2011
ACM
14 years 4 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
128
Voted
ASPDAC
2005
ACM
106views Hardware» more  ASPDAC 2005»
15 years 3 months ago
Using loop invariants to fight soft errors in data caches
Ever scaling process technology makes embedded systems more vulnerable to soft errors than in the past. One of the generic methods used to fight soft errors is based on duplicati...
Sri Hari Krishna Narayanan, Seung Woo Son, Mahmut ...
IROS
2007
IEEE
137views Robotics» more  IROS 2007»
15 years 8 months ago
Part based people detection using 2D range data and images
Abstract— This paper addresses the problem of people detection using 2D range data and omnidirectional vision. The range data is often used in robotics to detect person legs. Fir...
Zoran Zivkovic, Ben J. A. Kröse
110
Voted
ACCV
2007
Springer
15 years 8 months ago
Human Pose Estimation from Volume Data and Topological Graph Database
This paper proposes a novel volume-based motion capture method using a bottom-up analysis of volume data and an example topology database of the human body. By using a two-step gra...
Hidenori Tanaka, Atsushi Nakazawa, Haruo Takemura