Sciweavers

575 search results - page 69 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SAC
2009
ACM
14 years 11 days ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 6 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
IADIS
2004
13 years 9 months ago
Relevance feedback using semantic association between indexing terms in large free text corpuses
Relevance feedback has been considered as a means of incorporating learning into information retrieval systems for quite sometime now. This paper discusses the research results of...
Shahzad Khan, Kenan Azam
ICMCS
2008
IEEE
156views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Human attention model for semantic scene analysis in movies
In this paper, we specifically propose the Weber-Fechner Law-based human attention model for semantic scene analysis in movies. Different from traditional video processing techniq...
Anan Liu, Yongdong Zhang, Yan Song, Dongming Zhang...
JEI
2008
128views more  JEI 2008»
13 years 7 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...