Sciweavers

109 search results - page 16 / 22
» Information flow inference for free
Sort
View
ICCV
2011
IEEE
12 years 7 months ago
Blurred Target Tracking by Blur-driven Tracker
Visual tracking plays an important role in many computer vision tasks. A common assumption in previous methods is that the video frames are blur free. In reality, motion blurs are...
Yi Wu, Haibin Ling, Jingyi Yu, Feng Li, Xue Mei, E...
MOBIHOC
2003
ACM
14 years 7 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
WWW
2002
ACM
14 years 8 months ago
Authoring and annotation of web pages in CREAM
Richly interlinked, machine-understandable data constitute the basis for the Semantic Web. We provide a framework, CREAM, that allows for creation of metadata. While the annotatio...
Siegfried Handschuh, Steffen Staab
MSR
2010
ACM
14 years 14 days ago
Identifying licensing of jar archives using a code-search approach
—Free and open source software strongly promotes the reuse of source code. Some open source Java components/libraries are distributed as jar archives only containing the bytecode...
Massimiliano Di Penta, Daniel M. Germán, Gi...
DBSEC
2008
365views Database» more  DBSEC 2008»
13 years 8 months ago
Secure Construction of Contingency Tables from Distributed Data
Abstract. Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ...
Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. A...