Sciweavers

164 search results - page 26 / 33
» Covert two-party computation
Sort
View
SIBGRAPI
2007
IEEE
14 years 4 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
14 years 4 months ago
Analysis of noisy time-series signals with GA involving viral infection with tropism
In this paper we report on a study in which genetic algorithms are applied to the analysis of noisy time-series signals, which is related to the problem of analyzing the motion ch...
Yuji Sato, Yuta Yasuda, Ryuji Goto
NDSS
2005
IEEE
14 years 3 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
EUROCRYPT
2003
Springer
14 years 3 months ago
CAPTCHA: Using Hard AI Problems for Security
We introduce captcha, an automated test that humans can pass, but current computer programs can’t pass: any program that has high success over a captcha can be used to solve an u...
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, Joh...
NECO
2007
87views more  NECO 2007»
13 years 9 months ago
Reinforcement Learning State Estimator
cal networks in the learning of abstract and effector-specific representations of motor sequences. Neuroimage. 32, 714-727. (Neuroimage Editor’s Choice Award, 2006) Daw, N. D. Do...
Jun Morimoto, Kenji Doya