Sciweavers

405 search results - page 58 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICDM
2006
IEEE
226views Data Mining» more  ICDM 2006»
15 years 3 months ago
Converting Output Scores from Outlier Detection Algorithms into Probability Estimates
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
Jing Gao, Pang-Ning Tan
ROBIO
2006
IEEE
139views Robotics» more  ROBIO 2006»
15 years 3 months ago
Biologically Inspired Reflex Based Stabilization Control of a Humanoid Robot with Artificial SMA Muscles
- Suddenly occurring collisions or unintentional motions represent a high safety risk in robotics and must be prevented. Especially for humanoid robots, the influence of disturbanc...
Robert Kratz, Sebastian Klug, Maximilian Stelzer, ...
96
Voted
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
ACSAC
2005
IEEE
15 years 3 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
67
Voted
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
15 years 3 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...