Sciweavers

5752 search results - page 947 / 1151
» Informative Labeling Schemes
Sort
View
92
Voted
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
15 years 9 months ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue
EDBT
2009
ACM
113views Database» more  EDBT 2009»
15 years 9 months ago
Supporting annotations on relations
Annotations play a key role in understanding and curating databases. Annotations may represent comments, descriptions, lineage information, among several others. Annotation manage...
Mohamed Y. Eltabakh, Walid G. Aref, Ahmed K. Elmag...
109
Voted
ICASSP
2009
IEEE
15 years 9 months ago
Fusion of fMRI, sMRI, and EEG data using canonical correlation analysis
Typically data acquired through imaging techniques such as functional magnetic resonance imaging (fMRI), structural MRI (sMRI), and electroencephalography (EEG) are analyzed separ...
Nicolle M. Correa, Yi-Ou Li, Tülay Adali, Vin...
119
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
105
Voted
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
15 years 9 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen