Sciweavers

529 search results - page 82 / 106
» Context Sensitive Performance Analysis of Automotive Applica...
Sort
View
ESORICS
2008
Springer
15 years 6 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
16 years 4 months ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
CIVR
2006
Springer
106views Image Analysis» more  CIVR 2006»
15 years 8 months ago
Video Retrieval Using High Level Features: Exploiting Query Matching and Confidence-Based Weighting
Abstract. Recent research in video retrieval has focused on automated, highlevel feature indexing on shots or frames. One important application of such indexing is to support preci...
Shi-Yong Neo, Jin Zhao, Min-Yen Kan, Tat-Seng Chua
PLDI
2009
ACM
15 years 11 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...
IPPS
2007
IEEE
15 years 10 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...