Sciweavers

920 search results - page 141 / 184
» Selecting Secure Passwords
Sort
View
RECSYS
2009
ACM
14 years 2 months ago
Rating aggregation in collaborative filtering systems
Recommender systems based on user feedback rank items by aggregating users’ ratings in order to select those that are ranked highest. Ratings are usually aggregated using a weig...
Florent Garcin, Boi Faltings, Radu Jurca, Nadine J...
CSSE
2008
IEEE
14 years 2 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
ISCAS
2008
IEEE
97views Hardware» more  ISCAS 2008»
14 years 2 months ago
Quality-aware GSM speech watermarking
—Use of watermarking techniques to provide authentication and tamper proofing of speech in mobile environment is becoming important. However, the current efforts do not allow for...
K. J.-L. Christabel, Sabu Emmanuel, Mohan S. Kanka...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 2 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
ICDCS
2007
IEEE
14 years 2 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu