Sciweavers

GIL
2016
8 years 8 months ago
Automatisierte, teilzeitenspezifische Analyse von Maschinendaten am Beispiel der Bodenbearbeitung
: Operation profiles are used for machine design and testing by representing the demands that lead to a certain machine load. Due to the complexity of machine and implement use the...
Dietrich Kortenbruck, Hans W. Griepentrog
GIL
2016
8 years 8 months ago
Automatische Detektion von Trockenstress bei Tabakpflanzen mittels Machine-Learning-Verfahren
Abstract: Dieser Beitrag befasst sich mit der Klassifikation der Vitalität von Pflanzen durch Machine-Learning-Verfahren am Beispiel von Trockenstress bei Tabak (Nicotiana tabacum...
Michael Siebers, Franz Uhrmann, Oliver Scholz, Chr...
GIL
2016
8 years 8 months ago
Evidenzkarten-basierte Sensorfusion zur Umfelderkennung und Interpretation in der Ernte
Abstract: Unser Ansatz zur Umfelderkennung in der Ernte basiert auf den Arbeiten zu Evidenzkarten von Elfes und Moravec. In einfacher Form kommen Evidenzkarten als „Occupancy Gri...
Timo Korthals, Andreas Skiba, Thilo Krause, Thorst...
GIL
2016
8 years 8 months ago
Roundwood Tracking using Log End Biometrics
: Log end biometrics is a physically marking free approach to establish log traceability from forest-site to further-processing companies. Within an Austrian research project quest...
Rudolf Schraml, Johann Charwat-Pessler, Karl Entac...
CODASPY
2016
8 years 8 months ago
Scalable and Secure Logistic Regression via Homomorphic Encryption
Logistic regression is a powerful machine learning tool to classify data. When dealing with sensitive data such as private or medical information, cares are necessary. In this pape...
Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phon...
CODASPY
2016
8 years 8 months ago
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities
Federated identity providers, e.g., Facebook and PayPal, offer a convenient means for authenticating users to third-party applications. Unfortunately such cross-site authenticatio...
John Maheswaran, Daniel Jackowitz, Ennan Zhai, Dav...
CODASPY
2016
8 years 8 months ago
Toward Large-Scale Vulnerability Discovery using Machine Learning
With sustained growth of software complexity, finding security vulnerabilities in operating systems has become an important necessity. Nowadays, OS are shipped with thousands of ...
Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. ...
CODASPY
2016
8 years 8 months ago
Risk-based Analysis of Business Process Executions
Organizations need to monitor their business processes to ensure that what actually happens in the system is compliant with the prescribed behavior. Deviations from the prescribed...
Mahdi Alizadeh, Nicola Zannone
CODASPY
2016
8 years 8 months ago
HoneyMix: Toward SDN-based Intelligent Honeynet
Honeynet is a collection of honeypots that are set up to attract as many attackers as possible to learn about their patterns, tactics, and behaviors. However, existing honeypots s...
Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-J...
CODASPY
2016
8 years 8 months ago
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Once data is released to the Internet, there is little hope to successfully delete it, as it may have been duplicated, reposted, and archived in multiple places. This poses a sign...
Apostolis Zarras, Katharina Kohls, Markus Dür...