Sciweavers

1300 search results - page 122 / 260
» Association Schemoids and Their Categories
Sort
View
CCS
2003
ACM
15 years 4 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
CCS
2003
ACM
15 years 4 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
DRM
2003
Springer
15 years 4 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
ICMI
2003
Springer
96views Biometrics» more  ICMI 2003»
15 years 4 months ago
Learning and reasoning about interruption
We present methods for inferring the cost of interrupting users based on multiple streams of events including information generated by interactions with computing devices, visual ...
Eric Horvitz, Johnson Apacible
ICPR
2010
IEEE
15 years 4 months ago
Extracting Captions in Complex Background from Videos
—Captions in videos play a significant role for automatically understanding and indexing video content, since much semantic information is associated with them. This paper presen...
Xiaoqian Liu, Weiqiang Wang