Sciweavers

3086 search results - page 572 / 618
» Developing Secure Web Applications
Sort
View
CVPR
2011
IEEE
13 years 22 days ago
Compact Hashing with Joint Optimization of Search Accuracy and Time
Similarity search, namely, finding approximate nearest neighborhoods, is the core of many large scale machine learning or vision applications. Recently, many research results dem...
Junfeng He, Regunathan Radhakrishnan, Shih-Fu Chan...
CSCW
2012
ACM
12 years 4 months ago
Predicting tie strength in a new medium
We have friends we consider very close and acquaintances we barely know. The social sciences use the term tie strength to denote this differential closeness with the people in our...
Eric Gilbert
JMM2
2006
151views more  JMM2 2006»
13 years 9 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
WWW
2009
ACM
14 years 9 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 3 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...