Sciweavers

1585 search results - page 85 / 317
» Automatically optimizing secure computation
Sort
View
ICMLA
2009
13 years 5 months ago
ECON: A Kernel Basis Pursuit Algorithm with Automatic Feature Parameter Tuning, and its Application to Photometric Solids Approx
This paper introduces a new algorithm, namely the EquiCorrelation Network (ECON), to perform supervised classification, and regression. ECON is a kernelized LARS-like algorithm, b...
Manuel Loth, Philippe Preux, Samuel Delepoulle, Ch...
TACAS
2010
Springer
245views Algorithms» more  TACAS 2010»
14 years 2 months ago
Stranger: An Automata-Based String Analysis Tool for PHP
STRANGER is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. STRANGER uses symbolic forward and back...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
ICIP
2010
IEEE
13 years 5 months ago
A classifier based approach for the detection of potential threats in CT based Baggage Screening
Recent years have seen increased use of Computed Tomography (CT) based Unaccompanied Baggage and Package Screening (UBPS) systems for luggage examination to ensure air travel secu...
Najla Megherbi, Gregory T. Flitton, Toby P. Brecko...
ICNS
2009
IEEE
13 years 5 months ago
Supporting High-Tech Crime Investigation through Dynamic Service Integration
In this paper we introduce the idea of integrating high security level services to support law enforcement with high-tech crime investigation. We take advantage of a process-orien...
Cezary Mazurek, Maciej Stroinski, Dariusz Walczak,...
MM
2003
ACM
125views Multimedia» more  MM 2003»
14 years 1 months ago
Automatic browsing of large pictures on mobile devices
Pictures have become increasingly common and popular in mobile communications. However, due to the limitation of mobile devices, there is a need to develop new technologies to fac...
Hao Liu, Xing Xie, Wei-Ying Ma, HongJiang Zhang