Sciweavers

592 search results - page 46 / 119
» Learning of personalized security settings
Sort
View
CVPR
2009
IEEE
1413views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Learning Semantic Scene Models by Object Classification and Trajectory Clustering
The visual surveillance task is to monitor the activity of objects in a scene. In far-field settings (i.e., wide outdoor areas), the majority of visible activities are objects movi...
Hanqing Lu, Stan Z. Li, Tianzhu Zhang
IJSN
2006
123views more  IJSN 2006»
13 years 7 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin
PET
2005
Springer
14 years 1 months ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov
ALT
2010
Springer
13 years 9 months ago
Optimal Online Prediction in Adversarial Environments
: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Peter L. Bartlett
ICALT
2010
IEEE
13 years 8 months ago
Continuous Use of Authoring for Adaptive Educational Hypermedia: A Long-term Case Study
—Adaptive educational hypermedia allows lessons to be personalized according to the needs of the learner. However, to achieve this, content must be split into stand-alone fragmen...
Jonathan G. K. Foss, Alexandra I. Cristea, Maurice...