Sciweavers

17920 search results - page 3507 / 3584
» Recentering computer science
Sort
View
95
Voted
CCS
2006
ACM
15 years 4 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
CIKM
2006
Springer
15 years 4 months ago
TRIPS and TIDES: new algorithms for tree mining
Recent research in data mining has progressed from mining frequent itemsets to more general and structured patterns like trees and graphs. In this paper, we address the problem of...
Shirish Tatikonda, Srinivasan Parthasarathy, Tahsi...
FGR
2004
IEEE
216views Biometrics» more  FGR 2004»
15 years 4 months ago
Multimodal Coordination of Facial Action, Head Rotation, and Eye Motion during Spontaneous Smiles
Both the configuration of facial features and the timing of facial actions are important to emotion and communication. Previous literature has focused on the former. We developed ...
Jeffrey F. Cohn, Lawrence Ian Reed, Tsuyoshi Moriy...
129
Voted
FPL
2004
Springer
144views Hardware» more  FPL 2004»
15 years 4 months ago
A Methodology for Energy Efficient FPGA Designs Using Malleable Algorithms
A recent trend towards integrating FPGAs with many heterogeneous components, such as memory systems, dedicated multipliers, etc., has made them an attractive option for implementin...
Jingzhao Ou, Viktor K. Prasanna
126
Voted
EUROCRYPT
2006
Springer
15 years 4 months ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...
« Prev « First page 3507 / 3584 Last » Next »