>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到surveillance相关记录82条 . 查询时间(0.078 秒)
Tensor-based modeling and computation emerge prominently with urgent demands from practical applications in the big data era. With the intrinsic sparsity in real data sets and the dimensionality reduc...
Surveillance cameras have an identity problem, fueled by an inherent tension between utility and privacy. As these powerful little devices have cropped up seemingly everywhere, the use of machine lear...
The expansion of artificial night lights globally has had important impacts on animal behavior and health. A new study led by researchers at the University of Oklahoma on the effects of brig...
As surveillance systems are popular, the privacy of the recorded video becomes more important. On the other hand, the authenticity of video images should be guaranteed when used as evidence in court. ...
At present, intelligent video analysis technology has been widely used in various fields. Object tracking is one of the important part of intelligent video surveillance, but the traditional target tra...
National Marine Fisheries Service (NMFS) of the United States National Oceanic and Atmospheric Administration (NOAA), the Department of Fisheries of Western Australia, the Australia Institute of Marin...
New research out of Case Western Reserve University School of Medicine describes a mechanism by which an essential quality control system in cells identifies and destroys faulty genetic material. The ...
Geographic information system (GIS) and remote sensing (RS) from Earth-observing satellites offer opportunities for rapid assessment of areas endemic for vector-borne diseases including estimates of p...
The mission planning problem of remote sensing satellites for emergency missions is investigated. A dynamic mission planning technology is introduced to solve the problem. For generating the newplan a...
Conference description: What is the future for surveillance and data security as our world is increasingly structured by algorithmic decision-making, artificial intelligence, the internet of things, a...
Motivated by revelations concerning population-wide surveillance of encrypted communications, we formalize and investigate the resistance of symmetric encryption schemes to mass surveillance. The foc...
Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass surveillance. This primitive is w...
Reproductive health has been paid more attention by international society since the concept was put forward in the International Conference on Population and Development (ICPD) in Cairo, Egypt in 1994...
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmetric encryption in the light of algorithm-substitution attacks (ASAs), which may be employed by ‘big brother’...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior ones in two ways. First, while prior attacks only broke a sub-class of randomized schemes having a ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...