Sciweavers

1186 search results - page 11 / 238
» A New Approach to Secure Logging
Sort
View
AI
2004
Springer
14 years 1 months ago
The Reconstruction of the Interleaved Sessions from a Server Log
Session reconstruction is an essential step in Web usage mining. The quality of reconstructed sessions affects the result of Web usage mining. This paper presents a new approach o...
John Zhong Lei, Ali A. Ghorbani
ICPR
2008
IEEE
14 years 9 months ago
Robust log-Gabor filter for ear biometrics
Ears are a new biometric with major advantage in that they appear to maintain their structure with increasing age. Expanding on our previous parts-based model, we propose a new wa...
Banafshe Arbab-Zavar, Mark Nixon
CSREASAM
2006
13 years 9 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
ACCV
2009
Springer
13 years 6 months ago
Human Action Recognition under Log-Euclidean Riemannian Metric
This paper presents a new action recognition approach based on local spatio-temporal features. The main contributions of our approach are twofold. First, a new local spatio-tempora...
Chunfeng Yuan, Weiming Hu, Xi Li, Stephen J. Mayba...
STOC
2007
ACM
102views Algorithms» more  STOC 2007»
14 years 8 months ago
Zero-knowledge from secure multiparty computation
A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multipar...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...