Sciweavers

590 search results - page 87 / 118
» Short Group Signatures
Sort
View
AAAI
2010
15 years 1 months ago
Community-Guided Learning: Exploiting Mobile Sensor Users to Model Human Behavior
Modeling human behavior requires vast quantities of accurately labeled training data, but for ubiquitous people-aware applications such data is rarely attainable. Even researchers...
Daniel Peebles, Hong Lu, Nicholas D. Lane, Tanzeem...
CVGIP
2006
171views more  CVGIP 2006»
14 years 12 months ago
Breathe easy: Model and control of human respiration for computer animation
In this paper, we detail an anatomically inspired, physically based model of the human torso designed for the visual simulation of respiration using a mixed system of rigid and de...
Victor B. Zordan, Bhrigu Celly, Bill Yuan-chi Chiu...
CN
2007
106views more  CN 2007»
14 years 11 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
USS
2010
14 years 9 months ago
Automatic Generation of Remediation Procedures for Malware Infections
Despite the widespread deployment of malwaredetection software, in many situations it is difficult to preemptively block a malicious program from infecting a system. Rather, signa...
Roberto Paleari, Lorenzo Martignoni, Emanuele Pass...
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
14 years 9 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...