Sciweavers

5752 search results - page 418 / 1151
» Informative Labeling Schemes
Sort
View
ICCV
2007
IEEE
16 years 7 months ago
Gradient Feature Selection for Online Boosting
Boosting has been widely applied in computer vision, especially after Viola and Jones's seminal work [23]. The marriage of rectangular features and integral-imageenabled fast...
Ting Yu, Xiaoming Liu 0002
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 11 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
BMCBI
2005
124views more  BMCBI 2005»
15 years 5 months ago
Probabilistic annotation of protein sequences based on functional classifications
: One of the most evident achievements of bioinformatics is the development of methods that transfer biological knowledge from characterised proteins to uncharacterised sequences. ...
Emmanuel D. Levy, Christos A. Ouzounis, Walter R. ...
CCS
2010
ACM
15 years 5 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
TIFS
2010
130views more  TIFS 2010»
14 years 11 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena