Sciweavers

ISI
2010
Springer
13 years 10 months ago
Testing perception of crime in a virtual environment
—Fear of crime is a central topic in the field of victimization. In particular, criminologists are interested in the environmental structures and cues that generate fear. Resear...
Andrew J. Park, Valerie Spicer, Monique Guterres, ...
IEEEARES
2010
IEEE
13 years 10 months ago
A New DRM Architecture with Strong Enforcement
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Sascha Müller, Stefan Katzenbeisser
IDTRUST
2010
ACM
13 years 10 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
ISI
2008
Springer
13 years 10 months ago
Intelligent pattern recognition and biometrics
This talk deals with advanced concepts of Artificial Intelligence (AI) and Pattern Recognition (PR), and their applications to solving real life problems including biometrics appl...
P. Wang
ISI
2008
Springer
13 years 10 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
ISI
2008
Springer
13 years 10 months ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
GIL
2010
13 years 10 months ago
Model-based Approach to Quantify and Regionalize Peanut Production in the Major Peanut Production Provinces in the People's Repu
: China is the largest peanut producer in the world and peanut therefore an essential economic product earning significant income for China’s farmers. Major provinces for peanut ...
Heike Knörzer, Simone Graeff-Hönninger, ...
CCS
2010
ACM
13 years 10 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CCS
2010
ACM
13 years 10 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
CCS
2010
ACM
13 years 10 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...