Sciweavers

163 search results - page 29 / 33
» Data type based security alert dialogs
Sort
View
JEI
2002
152views more  JEI 2002»
13 years 8 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
13 years 6 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
ICCSA
2011
Springer
13 years 7 days ago
Integration of ePortfolios in Learning Management Systems
The LMS plays a decisive role in most eLearning environments. Although they integrate many useful tools for managing eLearning activities, they must also be effectively integrated ...
Ricardo Queirós, Lino Oliveira, José...
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
14 years 1 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara
ACMSE
2009
ACM
14 years 3 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison