Sciweavers

592 search results - page 13 / 119
» Learning of personalized security settings
Sort
View
ITICSE
2004
ACM
14 years 1 months ago
Teaching computer networking with the help of personal computer networks
This paper describes an “experiential” learning approach to teaching a foundational course on Computer Networking. In additional to the traditional laboratory sessions and ana...
Rocky K. C. Chang
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 11 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
MCS
2004
Springer
14 years 1 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
AIIDE
2008
13 years 10 months ago
TAP: An Effective Personality Representation for Inter-Agent Adaptation in Games
Tactical Agent Personality (TAP) is a modeling concept to capture tactical patterns in game agents, based on a personality concept introduced by Tan and Cheng (2007), to allow beh...
Chek Tien Tan, Ho-Lun Cheng
CVPR
2005
IEEE
14 years 9 months ago
Face Recognition with Image Sets Using Manifold Density Divergence
In many automatic face recognition applications, a set of a person's face images is available rather than a single image. In this paper, we describe a novel method for face r...
Ognjen Arandjelovic, Gregory Shakhnarovich, John F...