Sciweavers

2077 search results - page 296 / 416
» Designing Collaborative Learning Applications
Sort
View
IEEEARES
2008
IEEE
15 years 9 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
WACV
2008
IEEE
15 years 9 months ago
Locally Adjusted Robust Regression for Human Age Estimation
Automatic human age estimation has considerable potential applications in human computer interaction and multimedia communication. However, the age estimation problem is challengi...
Guodong Guo, Yun Fu, Thomas S. Huang, Charles R. D...
123
Voted
COLCOM
2009
IEEE
15 years 7 months ago
The PEI framework for application-centric security
This paper motivates the fundamental importance of application context for security. It then gives an overview of the PEI framework for application-centric security and outlines s...
Ravi S. Sandhu
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 7 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
RSCTC
1993
Springer
161views Fuzzy Logic» more  RSCTC 1993»
15 years 7 months ago
Quantifying Uncertainty of Knowledge Discovered From Databases
This paper focuses on the application of rough set constructs to inductive learning from a database. A design guideline is suggested, which provides users the option to choose app...
Yang Xiang, S. K. Michael Wong, Nick Cercone