Sciweavers

1801 search results - page 331 / 361
» Data Tagging for New Information Governance Models
Sort
View
ICPR
2004
IEEE
14 years 10 months ago
Probabilistic Combination of Multiple Modalities to Detect Interest
This paper describes a new approach to combine multiple modalities and applies it to the problem of affect recognition. The problem is posed as a combination of classifiers in a p...
Ashish Kapoor, Rosalind W. Picard, Yuri Ivanov
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
14 years 9 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
CEC
2008
IEEE
14 years 3 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...