Sciweavers

842 search results - page 160 / 169
» About the authors
Sort
View
JDFP
2006
139views more  JDFP 2006»
13 years 7 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
JSAC
2006
181views more  JSAC 2006»
13 years 7 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
PAMI
2008
220views more  PAMI 2008»
13 years 7 months ago
Pedestrian Detection via Classification on Riemannian Manifolds
Detecting different categories of objects in image and video content is one of the fundamental tasks in computer vision research. The success of many applications such as visual s...
Oncel Tuzel, Fatih Porikli, Peter Meer
AI
2005
Springer
13 years 7 months ago
Knowledge updates: Semantics and complexity issues
We consider the problem of how an agent's knowledge can be updated. We propose a formal method of knowledge update on the basis of the semantics of modal logic S5. In our met...
Chitta Baral, Yan Zhang
TC
2008
13 years 7 months ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...