Sciweavers

956 search results - page 166 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
IUI
2009
ACM
14 years 5 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...
GIL
2004
13 years 10 months ago
Web-basiertes GIS als Informationssystem interdisziplinerer Forschungsprojekte
Abstract: Interdisciplinary research projects with environmental focus need an information technology which is capable of describing the flow of minerals and other substances with ...
Claus Mückschel, Gabriel A. Schachtel, Jens N...
IEEEIAS
2009
IEEE
13 years 6 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
ISJGP
2010
13 years 5 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...