Sciweavers

3651 search results - page 641 / 731
» Data Mining for Security Applications
Sort
View
ITNG
2010
IEEE
14 years 9 months ago
Record Setting Software Implementation of DES Using CUDA
—The increase in computational power of off-the-shelf hardware offers more and more advantageous tradeoffs among efficiency, cost and availability, thus enhancing the feasibil...
Giovanni Agosta, Alessandro Barenghi, Fabrizio De ...
DIM
2007
ACM
15 years 3 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
102
Voted
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 4 days ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
ICC
2011
IEEE
257views Communications» more  ICC 2011»
13 years 10 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
ICIP
2003
IEEE
16 years 19 days ago
Evaluation strategies for automatic linguistic indexing of pictures
With the rapid technological advances in machine learning and data mining, it is now possible to train computers with hundreds of semantic concepts for the purpose of annotating i...
James Ze Wang, Jia Li, Sui Ching Lin