Sciweavers

203 search results - page 31 / 41
» A Data Hiding Scheme Based on LBPROT Pattern
Sort
View
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
SECON
2010
IEEE
13 years 5 months ago
Utility-Based Gateway Deployment for Supporting Multi-Domain DTNs
Abstract--Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the...
Ting He, Kang-Won Lee, Nikoletta Sofra, Kin K. Leu...
IWEC
2008
13 years 9 months ago
Game Bot Detection Based on Avatar Trajectory
In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generall...
Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, ...
MCS
2005
Springer
14 years 1 months ago
Mixture of Gaussian Processes for Combining Multiple Modalities
This paper describes a unified approach, based on Gaussian Processes, for achieving sensor fusion under the problematic conditions of missing channels and noisy labels. Under the ...
Ashish Kapoor, Hyungil Ahn, Rosalind W. Picard
ISBI
2006
IEEE
14 years 1 months ago
Non-contact fluorescence optical tomography with scanning area illumination
This contribution describes a novel non-contact fluorescence optical tomography scheme which utilizes multiple area illumination patterns, to reduce the illposedness of the inver...
Amit Joshi, Wolfgang Bangerth, Eva M. Sevick-Murac...