Ridge body parts features for human pose estimation and recognition from RGB-D video data
This paper addresses the issues of 3D human pose estimation, tracking and recognition
from RGB-D video sequences using a generative structured framework. Most existing …
from RGB-D video sequences using a generative structured framework. Most existing …
Tamper-resistant security for cyber-physical systems with eTRON architecture
MFF Khan, K Sakamura - … on Data Science and Data Intensive …, 2015 - ieeexplore.ieee.org
This article posits tamper-resistance as a necessary security measure for cyber-physical
systems (CPS). With omnipresent connectivity and pervasive use of mobile devices …
systems (CPS). With omnipresent connectivity and pervasive use of mobile devices …
Adaboost tracker embedded in adaptive particle filtering
Y Lei, X Ding, S Wang - 18th International Conference on …, 2006 - ieeexplore.ieee.org
Due to computational simplicity, low-level visual cues (such as color, contour and corner)
have been widely integrated into various visual trackers. However, the robustness of these …
have been widely integrated into various visual trackers. However, the robustness of these …
T-Kernel/SS: a secure filesystem with access control protection using tamper-resistant chip
T Yashiro, M Bessho, S Kobayashi… - 2010 IEEE 34th …, 2010 - ieeexplore.ieee.org
We propose T-Kernel/SS (Secure Storage), a secure file system with access control
protection using tamper-resistant chip. The main feature of our system is to protect access …
protection using tamper-resistant chip. The main feature of our system is to protect access …
[PDF][PDF] Distributed upcalls: a mechanism for layering asynchronous abstractions
DL Cohrs, BP Miller, LA Call - 1987 - minds.wisconsin.edu
A design for structuring asynchronous upward calls, called upcalls, was described by Clark
[2]. Upcalls allow a programmer to specify, for each layer in a system, a procedure that will …
[2]. Upcalls allow a programmer to specify, for each layer in a system, a procedure that will …
An Access Control Architecture for Distributing Trust in Pervasive Computing Environments
R Hill, J Al-Muhtadi, WE Byrd - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
Pervasive computing infrastructure is highly distributed and it is essential to develop security
mechanisms that enhance the security of the system by distributing trust among the various …
mechanisms that enhance the security of the system by distributing trust among the various …
Robust Enterprise Application Security with eTRON Architecture
MFF Khan, K Sakamura, N Koshizuka - Enterprise Security: Second …, 2017 - Springer
With information and communication technologies progressing at a rapid pace and
becoming increasingly affordable, the use of various e-services is gaining prevalence at all …
becoming increasingly affordable, the use of various e-services is gaining prevalence at all …
An Exploration of the Decision-Making Process Surrounding Biometric Access Control Implementation
DD Callaway - 2019 - search.proquest.com
The security of data and facilities is in increasing demand as the technological capabilities of
our society increase. The role of biometrics has taken on many forms, which have been used …
our society increase. The role of biometrics has taken on many forms, which have been used …
Design of an IPTV Conditional Access System Supporting Multiple-Services
GL Harding, AVDM Kayem - Information Security in Diverse …, 2014 - igi-global.com
Conditional Access (CA) is typically used by pay-television operators to restrict access to
content to authorized subscribers. While several commercial CA solutions exist for structured …
content to authorized subscribers. While several commercial CA solutions exist for structured …
[图书][B] A firewall model of file system security
L Hu - 2014 - search.proquest.com
File system security is fundamental to the security of UNIX and Linux systems since in these
systems almost everything is in the form of a file. To protect the system files and other …
systems almost everything is in the form of a file. To protect the system files and other …