Sciweavers

217 search results - page 34 / 44
» Selecting Cryptographic Key Sizes
Sort
View
IWDW
2005
Springer
14 years 1 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
LAMAS
2005
Springer
14 years 1 months ago
The Success and Failure of Tag-Mediated Evolution of Cooperation
Use of tags to limit partner selection for playing has been shown to produce stable cooperation in agent populations playing the Prisoner’s Dilemma game. There is, however, a lac...
Austin McDonald, Sandip Sen
ECML
2003
Springer
14 years 1 months ago
Robust k-DNF Learning via Inductive Belief Merging
A central issue in logical concept induction is the prospect of inconsistency. This problem may arise due to noise in the training data, or because the target concept does not fit...
Frédéric Koriche, Joël Quinquet...
ECCV
2010
Springer
14 years 9 days ago
A Robust and Scalable Approach to Face Identification
The problem of face identification has received significant attention over the years. For a given probe face, the goal of face identification is to match this unknown face against ...
ISHPC
1999
Springer
14 years 6 days ago
Dynamically Adaptive Parallel Programs
Abstract. Dynamic program optimization is the only recourse for optimizing compilers when machine and program parameters necessary for applying an optimization technique are unknow...
Michael Voss, Rudolf Eigenmann