Sciweavers

5758 search results - page 1066 / 1152
» Anonymity-preserving data collection
Sort
View
PCM
2004
Springer
197views Multimedia» more  PCM 2004»
14 years 2 months ago
Face Samples Re-lighting for Detection Based on the Harmonic Images
Different environment illumination has a great impact on face detection. In this paper, we present a solution by the face relighting based on the harmonic images. The basic idea i...
Jie Chen, Yuemin Li, Laiyun Qing, Baocai Yin, Wen ...
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
14 years 2 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
POLICY
2004
Springer
14 years 2 months ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...
RAID
2004
Springer
14 years 2 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
VLDB
2004
ACM
111views Database» more  VLDB 2004»
14 years 2 months ago
A Framework for Using Materialized XPath Views in XML Query Processing
XML languages, such as XQuery, XSLT and SQL/XML, employ XPath as the search and extraction language. XPath expressions often define complicated navigation, resulting in expensive...
Andrey Balmin, Fatma Özcan, Kevin S. Beyer, R...
« Prev « First page 1066 / 1152 Last » Next »