Sciweavers

554 search results - page 63 / 111
» Detection of Human Actions From A Single Example
Sort
View
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
HUC
1999
Springer
14 years 1 days ago
InfoStick: An Interaction Device for Inter-Appliance Computing
Abstract. Many electric appliances have recently become network reachable, and we would receive better services from them if we could use them in combination. We have therefore dev...
Naohiko Kohtake, Jun Rekimoto, Yuichiro Anzai
CEEMAS
2007
Springer
14 years 1 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
GIR
2006
ACM
14 years 1 months ago
Detecting Geographical Serving Area of Web Resources
Most human activities occur around where the user is physically located. Knowing the geographical serving area of web resources, therefore, is very important for many web applicat...
Qi Zhang, Xing Xie, Lee Wang, Lihua Yue, Wei-Ying ...
WWW
2005
ACM
14 years 8 months ago
The classroom sentinel: supporting data-driven decision-making in the classroom
Whereas schools typically record mounds of data regarding student performance, attendance, and other behaviors over the course of a school year, rarely is that data consulted and ...
Mark K. Singley, Richard B. Lam