Sciweavers

368 search results - page 61 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
PET
2010
Springer
13 years 11 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
HPDC
2010
IEEE
13 years 8 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
INFOCOM
2012
IEEE
11 years 10 months ago
VDN: Virtual machine image distribution network for cloud data centers
—Cloud computing centers face the key challenge of provisioning diverse virtual machine instances in an elastic and scalable manner. To address this challenge, we have performed ...
Chunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei
ESCIENCE
2006
IEEE
14 years 1 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...
SCIA
2007
Springer
162views Image Analysis» more  SCIA 2007»
14 years 1 months ago
A Robust Approach for 3D Cars Reconstruction
Computing high quality 3D models from multi-view stereo reconstruction is an active topic as can be seen in a recent review [15]. Most approaches make the strong assumption that th...
Adrien Auclair, Laurent D. Cohen, Nicole Vincent