Sciweavers

1875 search results - page 234 / 375
» Modeling the Security of Steganographic Systems
Sort
View
KDD
2005
ACM
169views Data Mining» more  KDD 2005»
16 years 28 days ago
Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems ...
Bamshad Mobasher, Robin D. Burke, Chad Williams, R...
86
Voted
ICCV
2005
IEEE
15 years 6 months ago
HMM Based Falling Person Detection Using Both Audio and Video
Automatic detection of a falling person in video is an important problem with applications in security and safety areas including supportive home environments and CCTV surveillance...
B. Ugur Töreyin, Yigithan Dedeoglu, A. Enis &...
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 5 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
167
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 6 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
144
Voted
CODASPY
2011
14 years 4 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong