Sciweavers

550 search results - page 64 / 110
» A lightweight approach to state based security testing
Sort
View
CCS
2009
ACM
15 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
15 years 4 months ago
Bandit-Based Algorithms for Budgeted Learning
We explore the problem of budgeted machine learning, in which the learning algorithm has free access to the training examples’ labels but has to pay for each attribute that is s...
Kun Deng, Chris Bourke, Stephen D. Scott, Julie Su...
ESORICS
2006
Springer
15 years 1 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
ICPR
2006
IEEE
15 years 11 months ago
Emotion Recognition Based on Joint Visual and Audio Cues
Recent technological advances have enabled human users to interact with computers in ways previously unimaginable. Beyond the confines of the keyboard and mouse, new modalities fo...
Nicu Sebe, Ira Cohen, Theo Gevers, Thomas S. Huang
ICCAD
1999
IEEE
81views Hardware» more  ICCAD 1999»
15 years 2 months ago
Robust optimization based backtrace method for analog circuits
In this paper, we propose a new robust approach to signal backtrace for efficiently testing embedded analog modules in a large system. The proposed signal backtrace method is form...
Alfred V. Gomes, Abhijit Chatterjee