Sciweavers

1997 search results - page 33 / 400
» A Model for Data Leakage Detection
Sort
View
ICPR
2006
IEEE
16 years 27 days ago
Hidden Markov Models for Optical Flow Analysis in Crowds
This paper presents an event detector for emergencies in crowds. Assuming a single camera and a dense crowd we rely on optical flow instead of tracking statistics as a feature to ...
Ernesto L. Andrade, Scott Blunsden, Robert B. Fish...
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 3 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
CCR
2008
122views more  CCR 2008»
14 years 12 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang
DRM
2004
Springer
15 years 5 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
DAC
2011
ACM
13 years 11 months ago
AENEID: a generic lithography-friendly detailed router based on post-RET data learning and hotspot detection
In the era of deep sub-wavelength lithography for nanometer VLSI designs, manufacturability and yield issues are critical and need to be addressed during the key physical design i...
Duo Ding, Jhih-Rong Gao, Kun Yuan, David Z. Pan