Sciweavers

722 search results - page 110 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 13 days ago
Differential privacy and robust statistics
We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradig...
Cynthia Dwork, Jing Lei
OOPSLA
2007
Springer
15 years 6 months ago
A framework for distributed collaborative conceptual model development
One of the major concerns in the processes which involve human analysts is the existence of uncertainty/inconsistency. In this paper, we propose a model based on belief theory tha...
Ebrahim Bagheri, Ali A. Ghorbani
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 5 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
CCS
2008
ACM
15 years 1 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
ICCV
2009
IEEE
16 years 4 months ago
Time Series Prediction by Chaotic Modeling of Nonlinear Dynamical Systems
We use concepts from chaos theory in order to model nonlinear dynamical systems that exhibit deterministic behavior. Observed time series from such a system can be embedded into...
Arslan Basharat, Mubarak Shah