Sciweavers

211 search results - page 25 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
SAMT
2007
Springer
135views Multimedia» more  SAMT 2007»
14 years 1 months ago
Stopping Region-Based Image Segmentation at Meaningful Partitions
This paper proposes a new stopping criterion for automatic image segmentation based on region merging. The criterion is dependent on image content itself and when combined with the...
Tomasz Adamek, Noel E. O'Connor
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
14 years 23 days ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
WINET
2010
179views more  WINET 2010»
13 years 5 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
CIKM
2010
Springer
13 years 6 months ago
Examining the information retrieval process from an inductive perspective
Term-weighting functions derived from various models of retrieval aim to model human notions of relevance more accurately. However, there is a lack of analysis of the sources of e...
Ronan Cummins, Mounia Lalmas, Colm O'Riordan
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 2 months ago
Towards Unbiased BFS Sampling
Abstract—Breadth First Search (BFS) is a widely used approach for sampling large unknown Internet topologies. Its main advantage over random walks and other exploration technique...
Maciej Kurant, Athina Markopoulou, Patrick Thiran