Sciweavers

131 search results - page 7 / 27
» Active Data Protection with Data Journals
Sort
View
CHI
2005
ACM
14 years 8 months ago
Communicating intimacy one bit at a time
In this paper, we present a study of `minimal intimate objects': low bandwidth devices for communicating intimacy for couples in long-distance relationships. We describe a us...
Joseph Kaye, Mariah K. Levitt, Jeffrey Nevins, Jes...
DAC
2007
ACM
14 years 8 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
CCS
2009
ACM
14 years 2 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
ACSAC
1999
IEEE
13 years 12 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
ICASSP
2011
IEEE
12 years 11 months ago
Rapid speaker adaptation with speaker adaptive training and non-negative matrix factorization
In this paper, we describe a novel speaker adaptation algorithm based on Gaussian mixture weight adaptation. A small number of latent speaker vectors are estimated with non-negati...
Xueru Zhang, Kris Demuynck, Hugo Van hamme