Sciweavers

922 search results - page 141 / 185
» Attribute based data sharing with attribute revocation
Sort
View
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
WCE
2007
14 years 11 months ago
A Comparison of Classification Techniques for Technical Text Passages
— Our work explores the use of several text categorization techniques for classification of manufacturing quality defect and service shop data sets into fixed categories. Althoug...
Mark M. Kornfein, Helena Goldfarb
PRL
2007
107views more  PRL 2007»
14 years 9 months ago
Robust SS watermarking with improved capacity
Robustness is a key attribute of spread spectrum (SS) watermarking scheme. It is significantly deteriorated if one tries to achieve high embedding rate keeping other parameters u...
Santi P. Maity, Malay K. Kundu, Tirtha S. Das
ICRA
2010
IEEE
101views Robotics» more  ICRA 2010»
14 years 8 months ago
Searching for objects: Combining multiple cues to object locations using a maximum entropy model
— In this paper, we consider the problem of how background knowledge about usual object arrangements can be utilized by a mobile robot to more efficiently find an object in an ...
Dominik Joho, Wolfram Burgard
IGARSS
2009
14 years 7 months ago
Remotely Sensed Phenology for Mapping Biomes and Vegetation Functional Types
This study used remotely-sensed phenology data derived from Advanced Very High Resolution Radiometer (AVHRR), in a fully supervised decision-tree classification based on the new b...
Konrad J. Wessels, Karen Steenkamp, Graham Von Mal...