Sciweavers

8655 search results - page 502 / 1731
» Challenges for Trusted Computing
Sort
View
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 10 months ago
A Highly Legible CAPTCHA That Resists Segmentation Attacks
A CAPTCHA which humans find to be highly legible and which is designed to resist automatic character–segmentation attacks is described. As first detailed in [BR05], these ‘Sc...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang
ISI
2005
Springer
15 years 10 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
OTM
2005
Springer
15 years 10 months ago
Inter-enterprise collaboration management in dynamic business networks
The agility to collaborate in several business networks has become essential for the success of enterprises. The dynamic nature of collaborations and the autonomy of enterprises cr...
Lea Kutvonen, Janne Metso, Toni Ruokolainen
DIS
2004
Springer
15 years 10 months ago
Mining Noisy Data Streams via a Discriminative Model
The two main challenges typically associated with mining data streams are concept drift and data contamination. To address these challenges, we seek learning techniques and models ...
Fang Chu, Yizhou Wang, Carlo Zaniolo
NPC
2004
Springer
15 years 10 months ago
Online Mining in Sensor Networks
Online mining in large sensor networks just starts to attract interest. Finding patterns in such an environment is both compelling and challenging. The goal of this position paper ...
Xiuli Ma, Dongqing Yang, Shiwei Tang, Qiong Luo, D...