Sciweavers

562 search results - page 48 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
IPPS
2005
IEEE
15 years 9 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
CCS
2009
ACM
15 years 10 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
ASSETS
2006
ACM
15 years 10 months ago
Attention analysis in interactive software for children with autism
This work is a part of an ongoing project that focuses on potential applications of an interactive system that helps children with autism. Autism is classified as a neurodevelopm...
A. Ould Mohamed, Vincent Courboulay, Karim Sehaba,...
CCS
2010
ACM
15 years 4 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
HRI
2011
ACM
14 years 7 months ago
Managing social constraints on recharge behaviour for robot companions using memory
In this paper, we present an approach to monitor human activities such as entry, exit and break times of people in a workplace environment. The companion robot then learns the use...
Amol A. Deshmukh, Mei Yii Lim, Michael Kriegel, Ru...