Sciweavers

58 search results - page 5 / 12
» Efficient Robust Storage Using Secret Tokens
Sort
View
EDBT
2009
ACM
134views Database» more  EDBT 2009»
14 years 2 months ago
Caching content-based queries for robust and efficient image retrieval
In order to become an effective complement to traditional Web-scale text-based image retrieval solutions, content-based image retrieval must address scalability and efficiency iss...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
ICISC
2008
89views Cryptology» more  ICISC 2008»
14 years 10 days ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
ICCV
2009
IEEE
15 years 3 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
IJCNN
2000
IEEE
14 years 3 months ago
Storage and Recall of Complex Temporal Sequences through a Contextually Guided Self-Organizing Neural Network
A self-organizing neural network for learning and recall of complex temporal sequences is proposed. we consider a single sequence with repeated items, or several sequences with a c...
Guilherme De A. Barreto, Aluizio F. R. Araú...
USS
2010
13 years 8 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...