Sciweavers

133 search results - page 23 / 27
» Towards a Game Theoretic View of Secure Computation
Sort
View
GI
2009
Springer
14 years 14 days ago
Discovery of Smart Objects in Ubiquitous Environments and the Need for Interaction Metaphors
: In ubiquitous environments computers and smart devices, especially the technical view on them, disappear and users are supported to concentrate on the tasks they actually intend ...
René Reiners
ISNN
2005
Springer
14 years 1 months ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
CVPR
2007
IEEE
13 years 11 months ago
Diverse Active Ranking for Multimedia Search
Interactively learning from a small sample of unlabeled examples is an enormously challenging task, one that often arises in vision applications. Relevance feedback and more recen...
ShyamSundar Rajaram, Charlie K. Dagli, Nemanja Pet...
GI
2009
Springer
14 years 14 days ago
Presence Sensing Billboards
: The Out-of-Home (OOH) media markets currently rely on a plethora of methods and technologies for measuring their potential or real success. From nationwide interviews over statis...
Bernhard Wally, Alois Ferscha, Markus Lenger