Search For:

Displaying 1-23 out of 23 total
Credit Based Micro Licensing Scheme for Digital Services
Found in: 2012 Third International Conference on Services in Emerging Markets (ICSEM)
By Ina Jain,Nitin Singh Chauhan,Ashutosh Saxena
Issue Date:December 2012
pp. 37-43
Digital piracy poses a serious threat to majority of digital content and services, whether available offline or over the Internet. To combat against piracy, various licensing models are in practice. Further, with the proliferation of smart gadgets, distrib...
 
Threshold SKI Protocol for ID-based Cryptosystems
Found in: Information Assurance and Security, International Symposium on
By Ashutosh Saxena
Issue Date:August 2007
pp. 65-70
Traditional public key cryptography uses certificates to bind the users with their public keys and are considered the best alternative for key distribution, but requires to have a very involved key management process. Identity based cryptography makes the ...
 
Universal Designated Multi Verifier Signature without Random Oracles
Found in: Information Technology, International Conference on
By G. Shailaja, K. Phani Kumar, Ashutosh Saxena
Issue Date:December 2006
pp. 168-171
In this paper, we present a strong universal designated multi verifier signature scheme based on bilinear pairings, which does not resort to random oracles. The security of the proposed scheme relies on the hardness of solving q- Strong Diffie-Hellman prob...
 
Infinite Latent Conditional Random Fields
Found in: 2013 IEEE International Conference on Computer Vision Workshops (ICCVW)
By Yun Jiang,Ashutosh Saxena
Issue Date:December 2013
pp. 262-266
In this paper, we present Infinite Latent Conditional Random Fields (ILCRFs) that model the data through a mixture of CRFs generated from Dirichlet processes. Each CRF represents one possible explanation of the data. In addition to visible nodes and edges ...
 
A Digital Signature Architecture for Web Apps
Found in: IT Professional
By Harigopal K.B. Ponnapalli,Ashutosh Saxena
Issue Date:March 2013
pp. 42-49
This digital signature architecture provides browser-agnostic, client-side signature components and generic server-side signature validation components to help integrate signatures into Web applications. The authors also discuss ways to extend HTML syntax ...
 
A Green Software Development Life Cycle for Cloud Computing
Found in: IT Professional
By Nitin Singh Chauhan,Ashutosh Saxena
Issue Date:January 2013
pp. 28-34
Cloud computing's recent proliferation has received attention from green crusaders hoping to mitigate the carbon footprint of large datacenters and IT infrastructures, but what about the software? A new framework for a greener cloud focuses on energy-effic...
 
Toward Holistic Scene Understanding: Feedback Enabled Cascaded Classification Models
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Congcong Li,Adarsh Kowdle,Ashutosh Saxena,Tsuhan Chen
Issue Date:July 2012
pp. 1394-1408
Scene understanding includes many related subtasks, such as scene categorization, depth estimation, object detection, etc. Each of these subtasks is often notoriously hard, and state-of-the-art classifiers already exist for many of them. These classifiers ...
 
Make3D: Learning 3D Scene Structure from a Single Still Image
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Ashutosh Saxena, Min Sun, Andrew Y. Ng
Issue Date:May 2009
pp. 824-840
We consider the problem of estimating detailed 3D structure from a single still image of an unstructured environment. Our goal is to create 3D models that are both quantitatively accurate as well as visually pleasing. For each small homogeneous patch in th...
 
3-D Reconstruction from Sparse Views using Monocular Vision
Found in: Computer Vision, IEEE International Conference on
By Ashutosh Saxena, Min Sun, Andrew Y. Ng
Issue Date:October 2007
pp. 1-8
We consider the task of creating a 3-d model of a large novel environment, given only a small number of images of the scene. This is a difficult problem, because if the images are taken from very different viewpoints or if they contain similar-looking stru...
 
Learning 3-D Scene Structure from a Single Still Image
Found in: Computer Vision, IEEE International Conference on
By Ashutosh Saxena, Min Sun, Andrew Y. Ng
Issue Date:October 2007
pp. 1-8
We consider the problem of estimating detailed 3-d structure from a single still image of an unstructured environment. Our goal is to create 3-d models which are both quantitatively accurate as well as visually pleasing. For each small homogeneous patch in...
 
Mutual Authentication and Key Agreement for GSM
Found in: Mobile Business, International Conference on
By K.Phani Kumar, G. Shailaja, A. Kavitha, Ashutosh Saxena
Issue Date:June 2006
pp. 25
We propose an efficient identity based mutual authentication scheme for GSM. In the proposed scheme, mobile station (MS) and visitor location register (VLR) authenticate each other and establish a session key to communicate securely for every communication...
 
MMPS: A Versatile Mobile-to-Mobile Payment System
Found in: Mobile Business, International Conference on
By Ashutosh Saxena, Manik Lal Das, Anurag Gupta
Issue Date:July 2005
pp. 400-405
The paper presents an effective mobile-to-mobile payment system. A mobile phone with or without SIM card is enabled as an EMV payment instrument and is linked to a debit or credit account in a bank to pay merchant who has a mobile phone or an on-line EMV c...
 
SPAM: Secure Protocol for Authentication in Mobile-Communications
Found in: Mobile Business, International Conference on
By Manik Lal Das, Ashutosh Saxena
Issue Date:July 2005
pp. 23-27
The paper presents a secure protocol for authentication in mobile-communications. We analyse some existing works with their weaknesses. In our protocol we use a simple blinding-binding technique for users secret keys generation such that the base-station a...
 
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems
Found in: Information Technology: Coding and Computing, International Conference on
By Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved P. Gulati
Issue Date:April 2005
pp. 674-678
This paper presents an efficient and secure protocol for key issuing in ID-based cryptosystems using bilinear pairings. We use a simple blinding technique to eliminate the need of secure channel and multiple authorities approach to avoid the key escrow pro...
 
On Gossip Codes and Traceability Schemes
Found in: Information Technology: Coding and Computing, International Conference on
By Ravi S. Veerubhotla, Ashutosh Saxena, Ved P. Gulati, Arun K. Pujari
Issue Date:April 2004
pp. 772
This work presents a new construction technique for q-ary Gossip codes from Traceability schemes and vice versa. We demonstrate that these IPP codes, constructed by us, achieve the minimum possible code length specified for Gossip codes. Further, we show t...
 
3D Reasoning from Blocks to Stability
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Zhaoyin Jia,Andrew Gallagher,Ashutosh Saxena,Tsuhan Chen
Issue Date:February 2015
pp. 1
Objects occupy physical space and obey physical laws. To truly understand a scene, we must reason about the space that objects in it occupy, and how each objects is supported stably by each other. In other words, we seek to understand which objects would, ...
 
Hallucinated Humans as the Hidden Context for Labeling 3D Scenes
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Yun Jiang,Hema Koppula,Ashutosh Saxena
Issue Date:June 2013
pp. 2993-3000
For scene understanding, one popular approach has been to model the object-object relationships. In this paper, we hypothesize that such relationships are only an artifact of certain hidden factors, such as humans. For example, the objects, monitor and key...
 
3D-Based Reasoning with Blocks, Support, and Stability
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Zhaoyin Jia,Andrew Gallagher,Ashutosh Saxena,Tsuhan Chen
Issue Date:June 2013
pp. 1-8
3D volumetric reasoning is important for truly understanding a scene. Humans are able to both segment each object in an image, and perceive a rich 3D interpretation of the scene, e.g., the space an object occupies, which objects support other objects, and ...
 
Co-evolutionary predictors for kinematic pose inference from RGBD images
Found in: Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference (GECCO '12)
By Ashutosh Saxena, Daniel L. Ly, Hod Lipson
Issue Date:July 2012
pp. 967-974
Markerless pose inference of arbitrary subjects is a primary problem for a variety of applications, including robot vision and teaching by demonstration. Unsupervised kinematic pose inference is an ideal method for these applications as it provides a robus...
     
A cryptography based privacy preserving solution to mine cloud data
Found in: Proceedings of the Third Annual ACM Bangalore Conference (COMPUTE '10)
By Ashutosh Saxena, Meena Dilip Singh, P. Radha Krishna
Issue Date:January 2010
pp. 1-4
Due to increased adoption of cloud computing, there is a growing need of addressing the data privacy during mining. On the other hand, knowledge sharing is a key to survive many business organizations. Several attempts have been made to mine the data in di...
     
An efficient and secure protocol for DTV broadcasts
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Ashutosh Saxena
Issue Date:October 2009
pp. 288-292
Bilinear pairing based mutual authentication and key agreement protocol for DTV broadcast encryption is presented in this paper. The protocol facilitates key agreement with lesser communication between set-top box and smart card with forward secrecy and is...
     
Danger theory based SYN flood attack detection in autonomic network
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Ashutosh Saxena, Sanjay Rawat
Issue Date:October 2009
pp. 213-218
In the context of autonomic environment, we present a simple yet, effective Danger Theory based method to detect TCP SYN Flooding attack. An autonomous communication network consists of self-managed (i.e. self-configuring, self-awareness, self-optimization...
     
High speed obstacle avoidance using monocular vision and reinforcement learning
Found in: Proceedings of the 22nd international conference on Machine learning (ICML '05)
By Andrew Y. Ng, Ashutosh Saxena, Jeff Michels
Issue Date:August 2005
pp. 593-600
We consider the task of driving a remote control car at high speeds through unstructured outdoor environments. We present an approach in which supervised learning is first used to estimate depths from single monocular images. The learning algorithm can be ...
     
 1