Sciweavers

1186 search results - page 11 / 238
» A New Approach to Secure Logging
Sort
View
92
Voted
AI
2004
Springer
15 years 5 months ago
The Reconstruction of the Interleaved Sessions from a Server Log
Session reconstruction is an essential step in Web usage mining. The quality of reconstructed sessions affects the result of Web usage mining. This paper presents a new approach o...
John Zhong Lei, Ali A. Ghorbani
84
Voted
ICPR
2008
IEEE
16 years 1 months ago
Robust log-Gabor filter for ear biometrics
Ears are a new biometric with major advantage in that they appear to maintain their structure with increasing age. Expanding on our previous parts-based model, we propose a new wa...
Banafshe Arbab-Zavar, Mark Nixon
CSREASAM
2006
15 years 1 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
ACCV
2009
Springer
14 years 10 months ago
Human Action Recognition under Log-Euclidean Riemannian Metric
This paper presents a new action recognition approach based on local spatio-temporal features. The main contributions of our approach are twofold. First, a new local spatio-tempora...
Chunfeng Yuan, Weiming Hu, Xi Li, Stephen J. Mayba...
STOC
2007
ACM
102views Algorithms» more  STOC 2007»
16 years 20 days ago
Zero-knowledge from secure multiparty computation
A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multipar...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...