Sciweavers

1620 search results - page 41 / 324
» eg 2010
Sort
View
127
Voted
PERCOM
2010
ACM
15 years 8 months ago
Dead reckoning from the pocket - An experimental study
—Modern mobile phones enable absolute positioning based on GPS or WiFi. However, incremental positioning based on dead reckoning is an interesting source of complementary informa...
Ulrich Steinhoff, Bernt Schiele
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
15 years 8 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 7 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
INCDM
2010
Springer
152views Data Mining» more  INCDM 2010»
15 years 7 months ago
Spam Email Filtering Using Network-Level Properties
Abstract. Spam is serious problem that affects email users (e.g. phishing attacks, viruses and time spent reading unwanted messages). We propose a novel spam email filtering appr...
Paulo Cortez, André Correia, Pedro Sousa, M...
MCS
2010
Springer
15 years 6 months ago
Tomographic Considerations in Ensemble Bias/Variance Decomposition
Abstract. Classifier decision fusion has been shown to act in a manner analogous to the back-projection of Radon transformations when individual classifier feature sets are non o...
David Windridge