منابع مشابه
Impeding forgers at photo inception
We describe a new concept for making photo tampering more difficult and time consuming, and for a given amount of time and effort, more amenable to detection. We record the camera preview and camera motion in the moments just prior to image capture. This information is packaged along with the full resolution image. To avoid detection, any subsequent manipulation of the image would have to be pr...
متن کاملImpeding CAPTCHA Breakers with Visual Decryption
Abuse of free Internet resources and services from false account creation, to spam, to identity theft, excessive bandwidth usage, or even vote stuffing online polls is a big problem. The Completely Automatic Public Turing Test to tell Computers and Humans Apart (CAPTCHA) controls access to resources but automated systems are increasingly adept at overcoming them. In this paper a method of acces...
متن کاملGeneralized Non-impeding Noisy-AND Trees
To specify a Bayes net (BN), a conditional probability table (CPT), often of an effect conditioned on its n causes, needs assessed for each node. Its complexity is generally exponential in n. Noisy-OR reduces the complexity to linear, but can only represent reinforcing causal interactions. The non-impeding noisy-AND (NIN-AND) tree is the first causal model that explicitly expresses reinforcemen...
متن کاملImpeding Knowledge Management in Supply Chains
For many years following the Industrial Revolution there was a period of stability where knowledge of processes could be assimilated at a slow pace by new generations of workers: one ploughed the fields, set the seeds, and in due course gathered in the crops. Father taught son, and so life rolled on. This is not so nowadays, capital equipment is much larger and more expensive so it has to be ke...
متن کاملDistributed Tarpitting: Impeding Spam Across Multiple Servers
This paper describes an Irish ISP’s attempts to combat the abuse of resources caused by unsolicited commercial email. We describe the extension of a multicast system, used to implement POP-before-SMTP relaying, to share information about remote mail servers between multiple mail systems. The information may then be used to tarpit abusive servers – placing delays between SMTP protocol answers th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Reviews Neuroscience
سال: 2015
ISSN: 1471-003X,1471-0048
DOI: 10.1038/nrn3998