Sciweavers

1663 search results - page 114 / 333
» Computer Security in the Real World
Sort
View
131
Voted
ICCV
2011
IEEE
14 years 3 months ago
Delta-Dual Hierarchical Dirichlet Processes: A pragmatic abnormal behaviour detector
In the security domain a key problem is identifying rare behaviours of interest. Training examples for these behaviours may or may not exist, and if they do exist there will be fe...
Tom Haines, Queen Mary, Tao Xiang
135
Voted
GRAPHITE
2007
ACM
15 years 7 months ago
A shape hierarchy for 3D modelling from video
This paper describes an interactive method for generating a model of a scene from image data. The method uses the camera parameters and point cloud typically generated by structur...
Anton van den Hengel, Anthony R. Dick, Thorsten Th...
146
Voted
TKDE
2012
278views Formal Methods» more  TKDE 2012»
13 years 5 months ago
Data Cube Materialization and Mining over MapReduce
—Computing interesting measures for data cubes and subsequent mining of interesting cube groups over massive datasets are critical for many important analyses done in the real wo...
Arnab Nandi, Cong Yu, Philip Bohannon, Raghu Ramak...
IDTRUST
2010
ACM
15 years 8 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
146
Voted
FC
2006
Springer
139views Cryptology» more  FC 2006»
15 years 7 months ago
Defeating Malicious Servers in a Blind Signatures Based Voting System
In this paper, we present two failures in the blind signatures based voting system Votopia [2] which has been tested during the last World Soccer Cup. We then propose a fix which r...
Sébastien Canard, Matthieu Gaud, Jacques Tr...