Sciweavers

1186 search results - page 155 / 238
» A New Approach to Secure Logging
Sort
View
86
Voted
CISST
2003
83views Hardware» more  CISST 2003»
15 years 2 months ago
Computational Efficiency of Structural Image Matching
This paper addresses computational efficiency issues of a new algebraic method for imagery registration/conflation. An algebraic approach to conflation/registration of images does ...
Richard Chase, Boris Kovalerchuk
RAID
2009
Springer
15 years 7 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
90
Voted
CHI
2006
ACM
16 years 1 months ago
Interweaving mobile games with everyday life
We introduce a location?based game called Feeding Yoshi that provides an example of seamful design, in which key characteristics of its underlying technologies--the coverage and s...
Marek Bell, Matthew Chalmers, Louise Barkhuus, Mal...
ASIACRYPT
2001
Springer
15 years 4 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
STOC
2012
ACM
209views Algorithms» more  STOC 2012»
13 years 3 months ago
Nearly optimal solutions for the chow parameters problem and low-weight approximation of halfspaces
The Chow parameters of a Boolean function f : {−1, 1}n → {−1, 1} are its n + 1 degree-0 and degree-1 Fourier coefficients. It has been known since 1961 [Cho61, Tan61] that ...
Anindya De, Ilias Diakonikolas, Vitaly Feldman, Ro...