Sciweavers

14850 search results - page 2933 / 2970
» The Security of
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 8 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
CVIU
2007
240views more  CVIU 2007»
13 years 8 months ago
Objective evaluation of approaches of skin detection using ROC analysis
Skin detection is an important indicator of human presence and actions in many domains, including interaction, interfaces and security. It is commonly performed in three steps: tr...
Stephen Schmugge, Sriram Jayaram, Min C. Shin, Leo...
JOT
2008
136views more  JOT 2008»
13 years 8 months ago
The Stock Statistics Parser
This paper describes how use the HTMLEditorKit to perform web data mining on stock statistics for listed firms. Our focus is on making use of the web to get information about comp...
Douglas Lyon
JOT
2008
142views more  JOT 2008»
13 years 8 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon
JCS
2006
157views more  JCS 2006»
13 years 8 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov
« Prev « First page 2933 / 2970 Last » Next »