Sciweavers

1186 search results - page 178 / 238
» A New Approach to Secure Logging
Sort
View
87
Voted
AIMSA
2006
Springer
15 years 4 months ago
N-Gram Feature Selection for Authorship Identification
Automatic authorship identification offers a valuable tool for supporting crime investigation and security. It can be seen as a multi-class, single-label text categorization task. ...
John Houvardas, Efstathios Stamatatos
CVPR
2011
IEEE
14 years 4 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
90
Voted
CCR
2007
110views more  CCR 2007»
15 years 18 days ago
Future internet research and experimentation: the FIRE initiative
The research community worldwide has increasingly drawn its attention to the weaknesses of the current Internet. Many proposals are addressing the perceived problems, ranging from...
Anastasius Gavras, Arto Karila, Serge Fdida, Marti...
CSSE
2008
IEEE
15 years 7 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
134
Voted
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 7 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll