Sciweavers

6555 search results - page 1240 / 1311
» Secure attribute-based systems
Sort
View
WWW
2011
ACM
13 years 5 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
JDCTA
2010
143views more  JDCTA 2010»
13 years 4 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
SPEECH
2010
154views more  SPEECH 2010»
13 years 4 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...
SPEECH
2010
122views more  SPEECH 2010»
13 years 4 months ago
Similarity and familiarity: Second language sentence recognition in first- and second-language multi-talker babble
The intelligibility of speech in noisy environments depends not only on the functionality of listeners' peripheral auditory systems, but also on cognitive factors such as the...
Kristin J. Van Engen
TDP
2010
189views more  TDP 2010»
13 years 4 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
« Prev « First page 1240 / 1311 Last » Next »