Sciweavers

1017 search results - page 31 / 204
» A General Model for Authenticated Data Structures
Sort
View
CVPR
2010
IEEE
13 years 6 months ago
Adaptive pose priors for pictorial structures
Pictorial structure (PS) models are extensively used for part-based recognition of scenes, people, animals and multi-part objects. To achieve tractability, the structure and param...
Benjamin Sapp, Chris Jordan, Ben Taskar
KDD
2006
ACM
146views Data Mining» more  KDD 2006»
14 years 9 months ago
Structure and evolution of online social networks
In this paper, we consider the evolution of structure within large online social networks. We present a series of measurements of two such networks, together comprising in excess ...
Ravi Kumar, Jasmine Novak, Andrew Tomkins
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
SIGCOMM
2010
ACM
13 years 8 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
DAS
2010
Springer
13 years 6 months ago
Information extraction by finding repeated structure
Repetition of layout structure is prevalent in document images. In document design, such repetition conveys the underlying logical and functional structure of the data. For exampl...
Evgeniy Bart, Prateek Sarkar