Sciweavers

3349 search results - page 595 / 670
» Data Security
Sort
View
ICIP
2007
IEEE
14 years 11 months ago
Three Dimensional Face Recognition using Wavelet Decomposition of Range Images
Interest in face recognition systems has increased significantly due to the emergence of significant commercial opportunities in surveillance and security applications. In this pa...
Sina Jahanbin, Hyohoon Choi, Alan C. Bovik, Kennet...
WWW
2004
ACM
14 years 10 months ago
Using context- and content-based trust policies on the semantic web
The current discussion about a future Semantic Web trust architecture is focused on reputational trust mechanisms based on explicit trust ratings. What is often overlooked is the ...
Christian Bizer, Radoslaw Oldakowski
OSDI
2004
ACM
14 years 10 months ago
Life or Death at Block-Level
A fundamental piece of information required in intelligent storage systems is the liveness of data. We formalize the notion of liveness within storage, and present two classes of ...
Muthian Sivathanu, Lakshmi N. Bairavasundaram, And...
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 10 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
14 years 10 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...