Sciweavers

506 search results - page 40 / 102
» The Platform for Privacy Preferences
Sort
View
IVS
2006
127views more  IVS 2006»
13 years 8 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
UAIS
2008
155views more  UAIS 2008»
13 years 8 months ago
Adaptive course generation through learning styles representation
This paper presents an approach to automatic course generation and student modeling. The method has been developed during the European funded projects Diogene and Intraserv, focuse...
Enver Sangineto, Nicola Capuano, Matteo Gaeta, Ale...
ACSAC
2004
IEEE
14 years 15 days ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
IEEEARES
2008
IEEE
14 years 3 months ago
Using Non-adaptive Group Testing to Construct Spy Agent Routes
We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is show...
Georgios Kalogridis, Chris J. Mitchell
IEEEARES
2007
IEEE
14 years 3 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath