Sciweavers

4511 search results - page 650 / 903
» Observation Based System Security
Sort
View
JDCTA
2010
161views more  JDCTA 2010»
14 years 10 months ago
A Globally Consistent Solution to Multiview Image Registration
Multiview image registration is to compute the globally consistent transformations of a sequence of images. Due to various uncertainties, multiview image registration is considere...
Zezhong Xu
221
Voted
ISICA
2009
Springer
15 years 10 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
CDC
2008
IEEE
136views Control Systems» more  CDC 2008»
15 years 10 months ago
Distributed hypothesis testing with a fusion center: The conditionally dependent case
Abstract— The paper deals with decentralized Bayesian detection with M hypotheses, and N sensors making conditionally correlated measurements regarding these hypotheses. Each sen...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
PKC
2007
Springer
219views Cryptology» more  PKC 2007»
15 years 10 months ago
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
Daewan Han, Myung-Hwan Kim, Yongjin Yeom
108
Voted
SIGECOM
2004
ACM
77views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Stopping outgoing spam
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...
Joshua T. Goodman, Robert Rounthwaite