Sciweavers

2213 search results - page 394 / 443
» Software Security
Sort
View
AVSS
2003
IEEE
15 years 5 months ago
Automatic Face Region Tracking for Highly Accurate Face Recognition in Unconstrained Environments
In this paper, we present a combined real-time face region tracking and highly accurate face recognition technique for an intelligent surveillance system. Highresolution face imag...
Young-Ouk Kim, Joon Ki Paik, Jingu Heo, Andreas Ko...
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 5 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
DISCEX
2003
IEEE
15 years 5 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 5 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
WMASH
2003
ACM
15 years 5 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...