Sciweavers

667 search results - page 34 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ISSTA
1993
ACM
15 years 3 months ago
Mutation Analysis Using Mutant Schemata
Mutation analysis is a powerful technique for assessing and improving the quality of test data used to unit test software. Unfortunately, current automated mutation analysis syste...
Roland H. Untch, A. Jefferson Offutt, Mary Jean Ha...
ATAL
2009
Springer
15 years 6 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ICPR
2004
IEEE
16 years 27 days ago
Action and Simultaneous Multiple-Person Identification Using Cubic Higher-Order Local Auto-Correlation
We propose a new method ? Cubic Higher-order Local Auto-Correlation (CHLAC) ? to address three-way data analysis. This method is a natural extension of Higherorder Local Auto-Corr...
Nobuyuki Otsu, Takumi Kobayashi
JMLR
2010
198views more  JMLR 2010»
14 years 6 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
ICDE
2004
IEEE
99views Database» more  ICDE 2004»
16 years 1 months ago
Proving Ownership over Categorical Data
This paper introduces a novel method of rights protection for categorical data through watermarking. We discover new watermark embedding channels for relational data with categori...
Radu Sion