Sciweavers

5945 search results - page 1013 / 1189
» A Model for Projection and Action
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 3 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
EMSOFT
2007
Springer
14 years 3 months ago
Loosely time-triggered architectures based on communication-by-sampling
We address the problem of mapping a set of processes which communicate synchronously on a distributed platform. The Time Triggered Architecture (TTA) proposed by Kopetz for the co...
Albert Benveniste, Paul Caspi, Marco Di Natale, Cl...
ICALT
2006
IEEE
14 years 3 months ago
Vicarious Learning and Multimodal Dialogue
Vicarious Learning is learning from watching others learn. We believe that this is a powerful model for computer-based learning. Learning episodes can be captured and replayed to ...
John Lee
INFOCOM
2006
IEEE
14 years 3 months ago
QoS, Properties and Views to Achieve Dynamic Adaptivity
— This paper presents our work in the context of the Adaptive Resource Management (ARM) internal research project at the University of Milano-Bicocca, Italy. The project addresse...
Stefano Mussino, Mario Riva
SAC
2006
ACM
14 years 3 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
« Prev « First page 1013 / 1189 Last » Next »