Sciweavers

562 search results - page 80 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
132
Voted
CAMP
2005
IEEE
15 years 9 months ago
Virtual Astronomy, Information Technology, and the New Scientific Methodology
—All sciences, including astronomy, are now entering the era of information abundance. The exponentially increasing volume and complexity of modern data sets promises to transfor...
S. George Djorgovski
128
Voted
ICIP
2009
IEEE
15 years 1 months ago
Eye reflection analysis and application to display-camera calibration
We present a novel technique for calibrating display-camera systems from reflections in the user's eyes. Display-camera systems enable a range of vision applications that nee...
Christian Nitschke, Atsushi Nakazawa, Haruo Takemu...
SAC
2009
ACM
15 years 10 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
146
Voted
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 6 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
147
Voted
VIIP
2001
15 years 5 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher