Sciweavers

19003 search results - page 180 / 3801
» We Need Assurance!
Sort
View
ICIP
2005
IEEE
15 years 1 days ago
Semifragile hierarchical watermarking in a set theoretic framework
We introduce a set theoretic framework for watermarking and illustrate its effectiveness by designing a hierarchical semi-fragile watermark that is tolerant to compression and all...
Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mar...
KDD
2001
ACM
181views Data Mining» more  KDD 2001»
14 years 10 months ago
Identifying non-actionable association rules
Building predictive models and finding useful rules are two important tasks of data mining. While building predictive models has been well studied, finding useful rules for action...
Bing Liu, Wynne Hsu, Yiming Ma
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 5 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
IEEEARES
2009
IEEE
14 years 5 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...
CIDM
2009
IEEE
14 years 5 months ago
An empirical study of bagging and boosting ensembles for identifying faulty classes in object-oriented software
—  Identifying faulty classes in object-oriented software is one of the important software quality assurance activities. This paper empirically investigates the application of t...
Hamoud I. Aljamaan, Mahmoud O. Elish