Sciweavers

1816 search results - page 130 / 364
» Trace oblivious computation
Sort
View
CCR
2008
76views more  CCR 2008»
13 years 10 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford
CGF
2007
149views more  CGF 2007»
13 years 10 months ago
Interactive Simulation of the Human Eye Depth of Field and Its Correction by Spectacle Lenses
This paper describes a fast rendering algorithm for verification of spectacle lens design. Our method simulates refraction corrections of astigmatism as well as myopia or presbyo...
Masanori Kakimoto, Tomoaki Tatsukawa, Yukiteru Muk...
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 8 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
JOC
2008
86views more  JOC 2008»
13 years 10 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
EMMCVPR
2011
Springer
12 years 10 months ago
Data-Driven Importance Distributions for Articulated Tracking
Abstract. We present two data-driven importance distributions for particle filterbased articulated tracking; one based on background subtraction, another on depth information. In ...
Søren Hauberg, Kim Steenstrup Pedersen