Sciweavers

592 search results - page 38 / 119
» Learning of personalized security settings
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 7 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
CCS
2007
ACM
14 years 2 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CVPR
2010
IEEE
14 years 1 months ago
Contour People: A Parameterized Model of 2D Articulated Human Shape
We define a new “contour person” model of the human body that has the expressive power of a detailed 3D model and the computational benefits of a simple 2D part-based model....
Oren Freifeld, Alex Weiss, Silvia Zuffi, Michael B...
WIMOB
2008
IEEE
14 years 2 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
AGENTS
1997
Springer
14 years 1 days ago
Adaptation and Learning in Animated Creatures
This paper is concerned with synthetic agents interacting with virtual environments, called animated creatures. The animated creatures are articulated graphical gures that are eq...
Jiming Liu, Hong Qin, Yuan Yan Tang, Y. T. Wu