Sciweavers

185 search results - page 23 / 37
» On the Consistency of the Normalized Eight-Point Algorithm
Sort
View
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
14 years 8 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
ICPR
2008
IEEE
14 years 2 months ago
Image analysis approach for identification of renal transplant rejection
Acute renal rejection is the most common reason for graft (transplanted kidney) failure after kidney transplantation, and early detection is crucial to survival of function in the...
Ayman El-Baz, Georgy L. Gimel'farb, Mohamed Abou E...
SIGCOMM
2006
ACM
14 years 1 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
LWA
2007
13 years 9 months ago
Parameter Learning for a Readability Checking Tool
This paper describes the application of machine learning methods to determine parameters for DeLite, a readability checking tool. DeLite pinpoints text segments that are difficul...
Tim vor der Brück, Johannes Leveling