Sciweavers

349 search results - page 41 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 8 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
CVPR
2007
IEEE
14 years 3 months ago
Optimized Color Sampling for Robust Matting
Image matting is the problem of determining for each pixel in an image whether it is foreground, background, or the mixing parameter, ”alpha”, for those pixels that are a mixt...
Jue Wang, Michael F. Cohen
BMCBI
2008
153views more  BMCBI 2008»
13 years 8 months ago
AWclust: point-and-click software for non-parametric population structure analysis
Background: Population structure analysis is important to genetic association studies and evolutionary investigations. Parametric approaches, e.g. STRUCTURE and L-POP, usually ass...
Xiaoyi Gao, Joshua D. Starmer
JUCS
2010
147views more  JUCS 2010»
13 years 7 months ago
Ambient Intelligence: Beyond the Inspiring Vision
Abstract: Ambient Intelligence (AmI) has emerged in the past 10 years as a multidisciplinary field within ubiquitous computing, attracting considerable research, funding and publi...
Rui José, Helena Rodrigues, Nuno Otero
WISTP
2010
Springer
14 years 3 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...