Sciweavers

IIR
2010
13 years 6 months ago
MOWIS: A System for Building Multimedia Ontologies from Web Information Sources
Defining ontologies within the multimedia domain still remains a challenging task, due to the complexity of multimedia data and the related associated knowledge. In this paper, we...
Vincenzo Moscato, Antonio Penta, Fabio Persia, Ant...
IH
2010
Springer
13 years 6 months ago
The Influence of the Image Basis on Modeling and Steganalysis Performance
Abstract. We compare two image bases with respect to their capabilities for image modeling and steganalysis. The first basis consists of wavelets, the second is a Laplacian pyramid...
Valentin Schwamberger, Pham Hai Dang Le, Bernhard ...
IH
2010
Springer
13 years 6 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright
IH
2010
Springer
13 years 6 months ago
Short Collusion-Secure Fingerprint Codes against Three Pirates
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
Koji Nuida
IFIP12
2010
13 years 6 months ago
A Fuzzy Non-linear Similarity Measure for Case-Based Reasoning Systems for Radiotherapy Treatment Planning
This paper presents a decision support system for treatment planning in brain cancer radiotherapy. The aim of a radiotherapy treatment plan is to apply radiation in a way that dest...
Rupa Jagannathan, Sanja Petrovic, Angela McKenna, ...
IFIP12
2010
13 years 6 months ago
Information Fusion for Entity Matching in Unstructured Data
Every day the global media system produces an abundance of news stories, all containing many references to people. An important task is to automatically generate reliable lists of ...
Omar Ali, Nello Cristianini
IFIP12
2010
13 years 6 months ago
Event Extraction for Legal Case Building and Reasoning
We are interested in developing tools to support the activities of lawyers in corporate litigation. In current applications, information such as characters that have played a signi...
Nikolaos Lagos, Frédérique Segond, S...
IEEECIT
2010
IEEE
13 years 6 months ago
Adaptive Algorithms for Efficient Content Management in Social Network Services
Identifying the set of resources that are expected to receive the majority of requests in the near future, namely hot set, is at the basis of most content management strategies of...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
IEEECIT
2010
IEEE
13 years 6 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
IEEECIT
2010
IEEE
13 years 6 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark