Sciweavers

592 search results - page 11 / 119
» Learning of personalized security settings
Sort
View
IEEESCC
2007
IEEE
14 years 2 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
IPPS
2006
IEEE
14 years 1 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
CVPR
2010
IEEE
13 years 10 months ago
Multi-Task Warped Gaussian Process for Personalized Age Estimation
Automatic age estimation from facial images has aroused research interests in recent years due to its promising potential for some computer vision applications. Among the methods ...
Yu Zhang, Dit-Yan Yeung
SIGMETRICS
2000
ACM
101views Hardware» more  SIGMETRICS 2000»
14 years 1 days ago
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
We consider an architecture for a serverless distributed file system that does not assume mutual trust among the client computers. The system provides security, availability, and ...
William J. Bolosky, John R. Douceur, David Ely, Ma...
WOA
2003
13 years 9 months ago
Agents Ownership Setting by User Fingerprints
— Agent ownership is a difficult task that touches legal domain. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent’s act...
Salvatore Vitabile, Giovanni Pilato, Vincenzo Cont...