Sciweavers

37 search results - page 1 / 8
» Information gathering in adversarial systems: lines and cycl...
Sort
View
SPAA
2003
ACM
13 years 9 months ago
Information gathering in adversarial systems: lines and cycles
In this paper we consider the problem of routing packets to a single destination in a dynamically changing network, where both the network and the packet injections are under adve...
Kishore Kothapalli, Christian Scheideler
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
13 years 11 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
SASO
2008
IEEE
13 years 11 months ago
nuBOINC: BOINC Extensions for Community Cycle Sharing
Currently, cycle sharing over the Internet is a one-way deal. Computer owners only have one role in the process: to donate their computers’ idle time. This is due to the fact th...
João Nuno Silva, Luís Veiga, Paulo F...
PAMI
2002
184views more  PAMI 2002»
13 years 4 months ago
Identifying Faces in a 2D Line Drawing Representing a Manifold Object
A straightforward way to illustrate a 3D model is to use a line drawing. Faces in a 2D line drawing provide important information for reconstructing its 3D geometry. Manifold objec...
Jianzhuang Liu, Yong Tsui Lee, Wai-kuen Cham
CCS
2008
ACM
13 years 6 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...