Sciweavers

98 search results - page 6 / 20
» Utilizing network features for privacy violation detection
Sort
View
WPES
2006
ACM
14 years 1 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
ICVGIP
2004
13 years 8 months ago
Cursive Word Recognition Using a Novel Feature Extraction Method and a Neural Network
In this paper, we present a holistic system for the recognition of cursive handwriting that utilizes a novel feature extraction method and a neural network. The Hough transform is...
José Ruiz-Pinales, René Jaime-Rivas
ACSAC
1999
IEEE
13 years 11 months ago
Architecture and Concepts of the ARGuE Guard
ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation. ARGuE is based on Network Associates' Gauntlet firewa...
Jeremy Epstein
MVA
2007
153views Computer Vision» more  MVA 2007»
13 years 6 months ago
An image-based feature tracking algorithm for real-time measurement of clad height
This paper presents a novel algorithm for real-time detection of clad height in laser cladding which is known as a layered manufacturing technique. A realtime measurement of clad g...
Mehrdad Iravani-Tabrizipour, Ehsan Toyserkani
CCS
2010
ACM
13 years 7 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...