Sciweavers

208 search results - page 6 / 42
» Computing Anonymously with Arbitrary Knowledge
Sort
View
ICDE
1999
IEEE
139views Database» more  ICDE 1999»
14 years 9 months ago
Clustering Large Datasets in Arbitrary Metric Spaces
Clustering partitions a collection of objects into groups called clusters, such that similar objects fall into the same group. Similarity between objects is defined by a distance ...
Venkatesh Ganti, Raghu Ramakrishnan, Johannes Gehr...
ICCV
2007
IEEE
14 years 2 months ago
Action Recognition from Arbitrary Views using 3D Exemplars
In this paper, we address the problem of learning compact, view-independent, realistic 3D models of human actions recorded with multiple cameras, for the purpose of recognizing th...
Daniel Weinland, Edmond Boyer, Rémi Ronfard
P2P
2006
IEEE
14 years 1 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton
DCOSS
2005
Springer
14 years 1 months ago
Stably Computable Properties of Network Graphs
We consider a scenario in which anonymous, finite-state sensing devices are deployed in an ad-hoc communication network of arbitrary size and unknown topology, and explore what p...
Dana Angluin, James Aspnes, Melody Chan, Michael J...
TISSEC
2010
237views more  TISSEC 2010»
13 years 2 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...