Sciweavers

298 search results - page 16 / 60
» Computer security: quality rather than quantity
Sort
View
PAISI
2010
Springer
13 years 7 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
VC
1998
66views more  VC 1998»
13 years 9 months ago
Vertex representations and their applications in computer graphics
The vertex representation, a new data structure for representing and manipulating orthogonal objects, is presented. Both interiors and boundaries of regions are represented implic...
Claudio Esperança, Hanan Samet
ICNC
2005
Springer
14 years 3 months ago
A Natural Language Watermarking Based on Chinese Syntax
Abstract. A novel text watermarking algorithm is presented. It combines natural language watermarking and Chinese syntax based on BP neural networks. Since the watermarking signals...
Yuling Liu, Xingming Sun, Yong Wu
CVPR
2011
IEEE
13 years 6 months ago
Learning Effective Human Pose Estimation from Inaccurate Annotation
The task of 2-D articulated human pose estimation in natural images is extremely challenging due to the high level of variation in human appearance. These variations arise from di...
Sam Johnson, Mark Everingham
JOC
2010
123views more  JOC 2010»
13 years 4 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell