Sciweavers

203 search results - page 15 / 41
» A Data Hiding Scheme Based on LBPROT Pattern
Sort
View
CCS
1999
ACM
13 years 12 months ago
Password Hardening Based on Keystroke Dynamics
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between ke...
Fabian Monrose, Michael K. Reiter, Susanne Wetzel
ANOR
2010
82views more  ANOR 2010»
13 years 7 months ago
Time-based detection of changes to multivariate patterns
Detection of changes to multivariate patterns is an important topic in a number of different domains. Modern data sets often include categorical and numerical data and potentially...
Jing Hu, George C. Runger
IACR
2011
127views more  IACR 2011»
12 years 7 months ago
Oblivious RAM with O((log N)^3) Worst-Case Cost
Oblivious RAM (O-RAM) is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing applications. This paper proposes...
Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Ming...
TIP
2008
208views more  TIP 2008»
13 years 7 months ago
Vision Processing for Realtime 3-D Data Acquisition Based on Coded Structured Light
Structured light vision systems have been successfully used for accurate measurement of 3-D surfaces in computer vision. However, their applications are mainly limited to scanning ...
S. Y. Chen, Y. F. Li, Jianwei Zhang
MCS
2009
Springer
14 years 2 months ago
Ensemble Based Data Fusion for Gene Function Prediction
The availability of an ever increasing amount of data sources due to recent advances in high throughput biotechnologies opens unprecedented opportunities for genome-wide gene funct...
Matteo Re, Giorgio Valentini