Sciweavers

1402 search results - page 156 / 281
» Personalized privacy preservation
Sort
View
97
Voted
SPW
1999
Springer
15 years 5 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
ACSAC
2008
IEEE
15 years 2 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...
112
Voted
ISI
2006
Springer
15 years 20 days ago
Analyzing Entities and Topics in News Articles Using Statistical Topic Models
Statistical language models can learn relationships between topics discussed in a document collection and persons, organizations and places mentioned in each document. We present a...
David Newman, Chaitanya Chemudugunta, Padhraic Smy...
80
Voted
ACSAC
2009
IEEE
15 years 7 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
69
Voted
MM
2005
ACM
88views Multimedia» more  MM 2005»
15 years 6 months ago
LazyCut: content-aware template-based video authoring
Though there are many commercial video authoring tools available today, video authoring remains as a tedious and extremely time consuming task that often requires trained professi...
Xian-Sheng Hua, Zengzhi Wang, Shipeng Li