Sciweavers

6318 search results - page 35 / 1264
» Data Leakage Detection
Sort
View
NIPS
2004
15 years 1 months ago
Seeing through water
We consider the problem of recovering an underwater image distorted by surface waves. A large amount of video data of the distorted image is acquired. The problem is posed in term...
Alexei A. Efros, Volkan Isler, Jianbo Shi, Mirk&oa...
WCE
2007
15 years 1 months ago
Analog Spiking Neuron with Charge-Coupled Synapses
—This paper presents a compact analog neuron cell with an array of charge-coupled synapses connected via a common output terminal. Synaptic responses are fed into a current mirro...
Yajie Chen, Steve Hall, Liam McDaid, Octavian Buiu...
LATINCRYPT
2010
14 years 10 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
CSREASAM
2010
14 years 10 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
PAKDD
2005
ACM
133views Data Mining» more  PAKDD 2005»
15 years 5 months ago
An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning
This paper proposes a novel anomaly detection system for spacecrafts based on data mining techniques. It constructs a nonlinear probabilistic model w.r.t. behavior of a spacecraft ...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida