Sciweavers

1812 search results - page 224 / 363
» Test Early, Test Often
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 1 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ICCV
2011
IEEE
13 years 10 months ago
Shape-constrained Gaussian Process Regression for Facial-point-based Head-pose Normalization
Given the facial points extracted from an image of a face in an arbitrary pose, the goal of facial-point-based headpose normalization is to obtain the corresponding facial points ...
Ognjen Rudovic, Maja Pantic
ISSTA
2012
ACM
13 years 13 days ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
EUROCRYPT
2012
Springer
13 years 12 days ago
Property Preserving Symmetric Encryption
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Omkant Pandey, Yannis Rouselakis
ICCV
2009
IEEE
16 years 3 months ago
Active Skeleton for Non-rigid Object Detection
We present a shape-based algorithm for detecting and recognizing non-rigid objects from natural images. The existing literature in this domain often cannot model the objects ver...
Xiang Bai, Xinggang Wang, Longin Jan Latecki, Weny...