Sciweavers

404 search results - page 49 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
162
Voted
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 7 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
126
Voted
CORR
2007
Springer
134views Education» more  CORR 2007»
15 years 3 months ago
On Four-group ML Decodable Distributed Space Time Codes for Cooperative Communication
— A construction of a new family of distributed space time codes (DSTCs) having full diversity and low Maximum Likelihood (ML) decoding complexity is provided for the two phase b...
G. Susinder Rajan, Anshoo Tandon, B. Sundar Rajan
132
Voted
PIMRC
2008
IEEE
15 years 10 months ago
Effects of topology on local throughput-capacity of ad hoc networks
—Most publications on the capacity and performance of wireless ad hoc networks share the underlying assumption of a uniform random distribution of nodes. In this paper, we study ...
Jakob Hoydis, Marina Petrova, Petri Mähö...
TIFS
2010
173views more  TIFS 2010»
15 years 1 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
134
Voted
BMCBI
2007
128views more  BMCBI 2007»
15 years 3 months ago
Detailed estimation of bioinformatics prediction reliability through the Fragmented Prediction Performance Plots
Background: An important and yet rather neglected question related to bioinformatics predictions is the estimation of the amount of data that is needed to allow reliable predictio...
Oliviero Carugo