Sciweavers

1997 search results - page 45 / 400
» A Model for Data Leakage Detection
Sort
View
CCS
2008
ACM
15 years 1 months ago
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 80056A sta...
Alfred Menezes, Berkant Ustaoglu
EDM
2009
153views Data Mining» more  EDM 2009»
14 years 9 months ago
Automatic Detection of Student Mental Models During Prior Knowledge Activation in MetaTutor
This paper presents several methods to automatically detecting students' mental models in MetaTutor, an intelligent tutoring system that teaches students self-regulatory proce...
Vasile Rus, Mihai C. Lintean, Roger Azevedo
CVPR
2005
IEEE
16 years 1 months ago
Part-Based Statistical Models for Object Classification and Detection
We propose using simple mixture models to define a set of mid-level binary local features based on binary oriented edge input. The features capture natural local structures in the...
Elliot Joel Bernstein, Yali Amit
ASUNAM
2010
IEEE
15 years 1 months ago
Detecting Highly Overlapping Communities with Model-Based Overlapping Seed Expansion
Abstract--As research into community finding in social networks progresses, there is a need for algorithms capable of detecting overlapping community structure. Many algorithms hav...
Aaron McDaid, Neil Hurley
ICIP
2007
IEEE
15 years 6 months ago
Motion Detection using a Model of Visual Attention
Motion detection and estimation are known to be important in many automated surveillance systems. It has drawn significant research interest in the field of computer vision. This ...
Shijie Zhang, Fred Stentiford