Sciweavers

511 search results - page 76 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
ISI
2005
Springer
15 years 9 months ago
Discovering Identity Problems: A Case Study
Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies...
Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsin...
MMM
2005
Springer
167views Multimedia» more  MMM 2005»
15 years 9 months ago
A Framework for Sub-Window Shot Detection
Browsing a digital video library can be very tedious especially with an ever expanding collection of multimedia material. We present a novel framework for extracting sub-window sh...
Chuohao Yeo, Yongwei Zhu, Qibin Sun, Shih-Fu Chang
157
Voted
ISSA
2004
15 years 5 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
135
Voted
CCS
2011
ACM
14 years 3 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
145
Voted
CCS
2011
ACM
14 years 3 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg