Sciweavers

418 search results - page 53 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
ICANN
2007
Springer
13 years 12 months ago
An Efficient Method for Pruning the Multilayer Perceptron Based on the Correlation of Errors
Abstract. In this paper we present a novel method for pruning redundant weights of a trained multilayer Perceptron (MLP). The proposed method is based on the correlation analysis o...
Cláudio M. S. Medeiros, Guilherme De A. Bar...
FGR
2011
IEEE
205views Biometrics» more  FGR 2011»
12 years 11 months ago
High resolution face sequences from a PTZ network camera
Abstract— We propose here to acquire high resolution sequences of a person’s face using a pan-tilt-zoom (PTZ) network camera. This capability should prove helpful in forensic a...
Thang Ba Dinh, Nam Vo, Gérard G. Medioni
CCS
2005
ACM
14 years 1 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
BIBE
2004
IEEE
13 years 11 months ago
Identifying the Combination of Genetic Factors that Determine Susceptibility to Cervical Cancer
Cervical cancer is common among women all over the world. Although infection with high-risk types of human papillomavirus (HPV) has been identified as the primary cause of cervical...
Jorng-Tzong Horng, Kai-Chih Hu, Li-Cheng Wu, Hsien...