Sciweavers

1646 search results - page 213 / 330
» Automatic generation of two-party computations
Sort
View
JCDL
2005
ACM
130views Education» more  JCDL 2005»
14 years 3 months ago
Leveraging context to resolve identity in photo albums
Our system suggests likely identity labels for photographs in a personal photo collection. Instead of using face recognition techniques, the system leverages automatically availab...
Mor Naaman, Ron B. Yeh, Hector Garcia-Molina, Andr...
IDEAS
2003
IEEE
106views Database» more  IDEAS 2003»
14 years 3 months ago
Frequent Itemsets Mining for Database Auto-Administration
With the wide development of databases in general and data warehouses in particular, it is important to reduce the tasks that a database administrator must perform manually. The a...
Kamel Aouiche, Jérôme Darmont, Le Gru...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 3 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
ICMCS
2010
IEEE
186views Multimedia» more  ICMCS 2010»
13 years 11 months ago
Worthy visual content on mobile through interactive video streaming
This paper builds on an interactive streaming architecture that supports both user feedback interpretation, and temporal juxtaposition of multiple video bitstreams in a single str...
Ivan Alen Fernandez, Christophe De Vleeschouwer, F...
CGF
2008
103views more  CGF 2008»
13 years 10 months ago
Image-based Shaving
Many categories of objects, such as human faces, can be naturally viewed as a composition of several different layers. For example, a bearded face with glasses can be decomposed i...
Minh Hoai Nguyen, Jean-François Lalonde, Al...