Results 1 - 10
of
57
Using synthetic decoys to digitally watermark personally-identifying data and to promote data security
- in Proceedings of the International Conference on Security and Management (SAM 2006
, 2006
"... Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with in some way in the coming years. As the number of people affected by identity theft and data spills has grown into the t ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
what source was used in the theft. It will also be shown how realistic decoys make it much more difficult to use the actual data, because of the inability to distinguish between what is real and what is fake. Finally, we will show how we have implemented a system that is capable of producing these very
Generalized Louvain method for community detection in large networks
"... Abstract—In this paper we present a novel strategy to discover the community structure of (possibly, large) networks. This approach is based on the well-know concept of network modularity optimization. To do so, our algorithm exploits a novel measure of edge centrality, based on the κ-paths. This te ..."
Abstract
- Add to MetaCart
Abstract—In this paper we present a novel strategy to discover the community structure of (possibly, large) networks. This approach is based on the well-know concept of network modularity optimization. To do so, our algorithm exploits a novel measure of edge centrality, based on the κ
Generalized Louvain Method for Community Detection in Large Networks
"... Abstract—In this paper we present a novel strategy to discover the community structure of (possibly, large) networks. This approach is based on the well-know concept of network modularity optimization. To do so, our algorithm exploits a novel measure of edge centrality, based on the κ-paths. This te ..."
Abstract
- Add to MetaCart
Abstract—In this paper we present a novel strategy to discover the community structure of (possibly, large) networks. This approach is based on the well-know concept of network modularity optimization. To do so, our algorithm exploits a novel measure of edge centrality, based on the κ
Network science Complex network Community detection
"... This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or sel ..."
Abstract
- Add to MetaCart
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution
†Databases and Distributed Systems
"... Abstract—We present an approach to the generation of realistic synthetic workloads for use in benchmarking of (massively) multiplayer online gaming infrastructures. Existing techniques are either too simple to be realistic or are too specific to a particular network structure to be used for comparin ..."
Abstract
- Add to MetaCart
are derived from a real gaming session with 16 players. We implemented the evaluation platform including the prototype game Planet PI4. A novel metric is used to measure the similarity between real and synthetic traces with respect to neighborhood characteristics. In our experiments, we compare real trace
Consistency and Confidence: A Dual Metric for Verifying 3D Object Detections in Multiple LiDAR Scans
"... We introduce a dual, physically meaningful metric for verifying whether a 3D model occupies a hypothesized lo-cation in LiDAR scans of a real world scene. We propose two complementary measures: consistency and confidence. The consistency measure uses a free space model along each scanner ray to dete ..."
Abstract
- Add to MetaCart
to determine whether the observations are consistent with the hypothesized model location. The con-fidence measure collects information from the model ver-tices to determine how much of the model was visible. The metrics do not require training data and are more easily interpretable to a user than typical
Integrative Bayesian Analysis of High-Dimensional Multi-platform Genomics Data
"... Motivation: Analyzing data from multi-platform genomics experiments combined with patients ’ clinical outcomes helps us understand the complex biological processes that characterize a disease, as well as how these processes relate to the development of the disease. Current integration approaches tha ..."
Abstract
-
Cited by 9 (4 self)
- Add to MetaCart
with clinical outcome. This framework uses a hierarchical modeling technique to combine the data obtained from multiple platforms into one model. Results: We assess the performance of our methods using several synthetic and real examples. Simulations show our integrative methods to have higher power to detect
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real
INPUT GUIDED PERFORMANCE EVALUATION
"... Performance evaluation is a difficult and very challenging task. In spite of many discussions in the literature, e.g., (Haralick et al., 1994), and well understood goals, e.g., (Christensen and Förstner, 1997; Haralick, 1994), there is a wide gap between what performance assessment using simple, syn ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
and analyzed analytically. It was also shown several years ago that any performance evaluation protocol requires a prohibitively large number of input images to obtain statistically significant measures (Haralick, 1989). We do not know, however, how to establish equivalence classes over the space of real
Results 1 - 10
of
57