Sciweavers

185 search results - page 7 / 37
» A Metrics Framework to Drive Application Security Improvemen...
Sort
View
ACL
2001
14 years 10 months ago
Quantitative and Qualitative Evaluation of Darpa Communicator Spoken Dialogue Systems
This paper describes the application of the PARADISE evaluation framework to the corpus of 662 human-computer dialogues collected in the June 2000 Darpa Communicator data collecti...
Marilyn A. Walker, Rebecca J. Passonneau, Julie E....
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
15 years 9 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CVPR
2012
IEEE
12 years 12 months ago
Learning hierarchical similarity metrics
Categories in multi-class data are often part of an underlying semantic taxonomy. Recent work in object classification has found interesting ways to use this taxonomy structure t...
Nakul Verma, Dhruv Mahajan, Sundararajan Sellamani...
ACSAC
2009
IEEE
15 years 4 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...