Sciweavers

525 search results - page 72 / 105
» Threshold Schemes with Disenrollment
Sort
View
ICCCN
2007
IEEE
15 years 6 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ISCAS
2007
IEEE
147views Hardware» more  ISCAS 2007»
15 years 6 months ago
A CMOS Image Sensor using Variable Reference Time Domain Encoding
— In this paper, a Variable Reference Time Domain Encoding CMOS image sensor is presented. The time domain encoding vision sensor is known to suffer from slow conversion time, es...
Man Kay Law, Amine Bermak
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
15 years 6 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich
SRDS
2007
IEEE
15 years 6 months ago
Framework for Intrusion Tolerant Certification Authority System Evaluation
Various intrusion tolerant certification authority (CA) systems have been recently proposed to provide attack resistant certificate update/query services. However, it is difficult...
Jingqiang Lin, Jiwu Jing, Peng Liu
DAGM
2007
Springer
15 years 6 months ago
A Duality Based Approach for Realtime TV-L1 Optical Flow
Variational methods are among the most successful approaches to calculate the optical flow between two image frames. A particularly appealing formulation is based on total variati...
Christopher Zach, Thomas Pock, Horst Bischof