Sciweavers

516 search results - page 53 / 104
» Comparing Two Information Flow Security Properties
Sort
View
126
Voted
ESORICS
2008
Springer
15 years 4 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
CVPR
2004
IEEE
16 years 4 months ago
Affine Image Registration Using a New Information Metric
We present a new information metric for multimodality image registration. The metric is technically a pseudometric since it satisfies the properties, i) nonnegativity, ii) symmetr...
Jie Zhang, Anand Rangarajan
138
Voted
ECIR
2010
Springer
15 years 23 days ago
Maximum Margin Ranking Algorithms for Information Retrieval
Abstract. Machine learning ranking methods are increasingly applied to ranking tasks in information retrieval (IR). However ranking tasks in IR often differ from standard ranking t...
Shivani Agarwal, Michael Collins
140
Voted
SUTC
2006
IEEE
15 years 8 months ago
Schedules with Minimized Access Latency for Disseminating Dependent Information on Multiple Channels
In wireless mobile environments, data broadcasting is an effective approach to disseminate information to mobile clients. In some applications, the access pattern of all the data...
Kun-Feng Lin, Chuan-Ming Liu
DBSEC
2004
83views Database» more  DBSEC 2004»
15 years 4 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu