Sciweavers

1186 search results - page 90 / 238
» A New Approach to Secure Logging
Sort
View
94
Voted
AAAI
2012
13 years 3 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe
103
Voted
JMLR
2008
110views more  JMLR 2008»
15 years 18 days ago
Cross-Validation Optimization for Large Scale Structured Classification Kernel Methods
We propose a highly efficient framework for penalized likelihood kernel methods applied to multiclass models with a large, structured set of classes. As opposed to many previous a...
Matthias W. Seeger
142
Voted
CIDR
2011
290views Algorithms» more  CIDR 2011»
14 years 4 months ago
Towards a One Size Fits All Database Architecture
We propose a new type of database system coined OctopusDB. Our approach suggests a unified, one size fits all data processing architecture for OLTP, OLAP, streaming systems, and...
Jens Dittrich, Alekh Jindal
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 7 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
97
Voted
IAT
2007
IEEE
15 years 7 months ago
Towards Automated Design of Multi-party Rational Exchange Security Protocols
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness bu...
Almudena Alcaide, Juan M. Estévez-Tapiador,...