Biblio

Found 19604 results

2018-06-04
2018-05-14
Xin, Wuping, Hourdos, John, Michalopoulos, Panos, Davis, Gary.  2008.  The less-than-perfect driver: a model of collision-inclusive car-following behavior. Transportation Research Record: Journal of the Transportation Research Board. :126–137.
2018-05-27
Pierre{-}Marc Jodoin, Janusz Konrad, Venkatesh Saligrama.  2008.  Modeling background activity for behavior subtraction. 2008 Second {ACM/IEEE} International Conference on Distributed Smart Cameras, Stanford, CA, USA, September 7-11, 2008. :1–10.
Pierre{-}Marc Jodoin, Janusz Konrad, Venkatesh Saligrama, Vincent Veilleux{-}Gaboury.  2008.  Motion detection with an unstable camera. Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}. :229–232.
J. Mike McHugh, Janusz Konrad, Venkatesh Saligrama, Pierre{-}Marc Jodoin, David A. Castañón.  2008.  Motion detection with false discovery rate control. Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}. :873–876.
Erhan Baki Ermis, Venkatesh Saligrama, Pierre{-}Marc Jodoin, Janusz Konrad.  2008.  Motion segmentation and abnormal behavior detection via behavior clustering. Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}. :769–772.
2018-05-14
Davis, Gary A, Hourdos, John, Xiong, Hui.  2008.  Outline of causal theory of traffic conflicts and collisions. Transportation Research Board 87th Annual Meeting.
2018-05-30
Liu, C., Feng, Y., Fan, M., Wang, G..  2008.  PKI Mesh Trust Model Based on Trusted Computing. 2008 The 9th International Conference for Young Computer Scientists. :1401–1405.

Different organizations or countries maybe adopt different PKI trust model in real applications. On a large scale, all certification authorities (CA) and end entities construct a huge mesh network. PKI trust model exhibits unstructured mesh network as a whole. However, mesh trust model worsens computational complexity in certification path processing when the number of PKI domains increases. This paper proposes an enhanced mesh trust model for PKI. Keys generation and signature are fulfilled in Trusted Platform Module (TPM) for higher security level. An algorithm is suggested to improve the performance of certification path processing in this model. This trust model is less complex but more efficient and robust than the existing PKI trust models.

2017-05-18
Phillips, B. J., Schmidt, C. D., Kelly, D. R..  2008.  Recovering Data from USB Flash Memory Sticks That Have Been Damaged or Electronically Erased. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop. :19:1–19:6.

In this paper we consider recovering data from USB Flash memory sticks after they have been damaged or electronically erased. We describe the physical structure and theory of operation of Flash memories; review the literature of Flash memory data recovery; and report results of new experiments in which we damage USB Flash memory sticks and attempt to recover their contents. The experiments include smashing and shooting memory sticks, incinerating them in petrol and cooking them in a microwave oven.

2018-05-14
Xin, Wuping, Hourdos, John.  2008.  A Spline-based Bi-level Optimization Approach for Extracting Accurate Vehicle Trajectories. 15th World Congress on Intelligent Transport Systems and ITS America's 2008 Annual MeetingITS AmericaERTICOITS JapanTransCore.
2018-05-27
2018-06-04
2018-05-14
2021-04-08
Bloch, M., Barros, J., Rodrigues, M. R. D., McLaughlin, S. W..  2008.  Wireless Information-Theoretic Security. IEEE Transactions on Information Theory. 54:2515–2534.
This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.
2018-06-04
Heaslip, Kevin.  2007.  Application of FAIR Lanes to Help Alleviate Freeway Congestion. ITE 2007 Annual Meeting and ExhibitInstitute of Transportation Engineers.
Heaslip, Kevin.  2007.  Are Travel Patterns of Older Drivers Changing? Submitted to the 29th International Association for Time use Research Conference, Washington, DC.
2018-05-27
2018-05-14
2018-06-04