Sciweavers

36 search results - page 3 / 8
» How to trust robots further than we can throw them
Sort
View
CIKM
2009
Springer
13 years 11 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu
SOSP
2007
ACM
14 years 2 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
JMLR
2010
166views more  JMLR 2010»
13 years 10 hour ago
Pairwise Measures of Causal Direction in Linear Non-Gaussian Acyclic Models
We present new measures of the causal direction between two non-gaussian random variables. They are based on the likelihood ratio under the linear non-gaussian acyclic model (LiNG...
Aapo Hyvärinen
EUROCRYPT
2005
Springer
13 years 10 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
ACSAC
2010
IEEE
13 years 3 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou