Sciweavers

2030 search results - page 392 / 406
» Extremal Problems of Information Combining
Sort
View
TRUST
2010
Springer
14 years 29 days ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
SIGMOD
2010
ACM
153views Database» more  SIGMOD 2010»
14 years 22 days ago
Threshold query optimization for uncertain data
The probabilistic threshold query (PTQ) is one of the most common queries in uncertain databases, where all results satisfying the query with probabilities that meet the threshold...
Yinian Qi, Rohit Jain, Sarvjeet Singh, Sunil Prabh...
EUROCRYPT
2010
Springer
14 years 22 days ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
ECCV
2010
Springer
14 years 13 days ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more di...
ERCIMDL
2001
Springer
205views Education» more  ERCIMDL 2001»
14 years 12 days ago
Building and Indexing a Distributed Multimedia Presentation Archive Using SMIL
This paper proposes an approach to the problem of generating metadata for composite mixed-media digital objects by appropriately combining and exploiting existing knowledge or met...
Jane Hunter, Suzanne Little