Sciweavers

1042 search results - page 137 / 209
» Failing First: An Update
Sort
View
NSPW
2004
ACM
14 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICDAR
2003
IEEE
14 years 3 months ago
Recognition of Folding Process from Origami Drill Books
This paper describes a framework to recognizing and recreating folding process of origami based on illustrations of origami drill books. Illustration images acquired from origami ...
Hiroshi Shimanuki, Jien Kato, Toyohide Watanabe
ACMICEC
2003
ACM
104views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
Document exchange model for augmenting added value of B2B collaboration
In this paper we present a B2B integration project, which aims to augment the added value of services instead of improving efficiency by automating processes. This paper introduce...
Koichi Hayashi, Riichiro Mizoguchi
UIST
2003
ACM
14 years 3 months ago
Perceptually-supported image editing of text and graphics
This paper presents a novel image editing program emphasizing easy selection and manipulation of material found in informal, casual documentssuch as sketches, handwrittennotes, wh...
Eric Saund, David J. Fleet, Daniel Larner, James M...
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
14 years 3 months ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang