Sciweavers

619 search results - page 5 / 124
» Coalition detection and identification
Sort
View
CONEXT
2008
ACM
14 years 12 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
ICASSP
2011
IEEE
14 years 1 months ago
Equiangular tight frame fingerprinting codes
We show that equiangular tight frames (ETFs) are particularly well suited as additive fingerprint designs against Gaussian averaging collusion attacks when the number of users is...
Dustin G. Mixon, Christopher J. Quinn, Negar Kiyav...
ICMCS
2007
IEEE
206views Multimedia» more  ICMCS 2007»
15 years 4 months ago
A Survey on Digital Camera Image Forensic Methods
There are two main interests in Image Forensics, namely source identification and forgery detection. In this paper, we first briefly
Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel, Mohan...
COLING
2008
14 years 11 months ago
A Classifier-Based Approach to Preposition and Determiner Error Correction in L2 English
In this paper, we present an approach to the automatic identification and correction of preposition and determiner errors in nonnative (L2) English writing. We show that models of...
Rachele De Felice, Stephen G. Pulman
ICPR
2004
IEEE
15 years 11 months ago
Automated Visual Identification of Characters in Situation Comedies
The objectives of the work described in this paper are simply stated: given examples of a particular person and an unlabelled video, we wish to find every instance of that person ...
Andrew Zisserman, Mark Everingham