Sciweavers

6555 search results - page 1011 / 1311
» Secure attribute-based systems
Sort
View
COLCOM
2007
IEEE
15 years 10 months ago
Kademlia for data storage and retrieval in enterprise networks
— Centralized organization of current enterprise networks doesn’t represent an ideal solution in terms of information security and reliability. Denial of service, packet filter...
Natalya Fedotova, Stefano Fanti, Luca Veltri
IROS
2007
IEEE
138views Robotics» more  IROS 2007»
15 years 10 months ago
On-demand sharing of a high-resolution panorama video from networked robotic cameras
— Due to their flexibility in coverage and resolution, networked robotic cameras become more and more popular in applications such as natural observation, security surveillance,...
Ni Qin, Dezhen Song
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 10 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
15 years 10 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
« Prev « First page 1011 / 1311 Last » Next »