Sciweavers

203 search results - page 31 / 41
» A Data Hiding Scheme Based on LBPROT Pattern
Sort
View
CCS
2009
ACM
16 years 8 days ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
SECON
2010
IEEE
14 years 9 months ago
Utility-Based Gateway Deployment for Supporting Multi-Domain DTNs
Abstract--Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the...
Ting He, Kang-Won Lee, Nikoletta Sofra, Kin K. Leu...
84
Voted
IWEC
2008
15 years 1 months ago
Game Bot Detection Based on Avatar Trajectory
In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generall...
Kuan-Ta Chen, Andrew Liao, Hsing-Kuo Kenneth Pao, ...
116
Voted
MCS
2005
Springer
15 years 5 months ago
Mixture of Gaussian Processes for Combining Multiple Modalities
This paper describes a unified approach, based on Gaussian Processes, for achieving sensor fusion under the problematic conditions of missing channels and noisy labels. Under the ...
Ashish Kapoor, Hyungil Ahn, Rosalind W. Picard
ISBI
2006
IEEE
15 years 5 months ago
Non-contact fluorescence optical tomography with scanning area illumination
This contribution describes a novel non-contact fluorescence optical tomography scheme which utilizes multiple area illumination patterns, to reduce the illposedness of the inver...
Amit Joshi, Wolfgang Bangerth, Eva M. Sevick-Murac...