Sciweavers

77016 search results - page 15290 / 15404
» Modeling
Sort
View
139
Voted
ASIACRYPT
2010
Springer
15 years 20 days ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
125
Voted
BMVC
2010
15 years 20 days ago
Automatic annotation of unique locations from video and text
Given a video and associated text, we propose an automatic annotation scheme in which we employ a latent topic model to generate topic distributions from weighted text and then mo...
Chris Engels, Koen Deschacht, Jan Hendrik Becker, ...
149
Voted
CASES
2010
ACM
15 years 20 days ago
Improved procedure placement for set associative caches
The performance of most embedded systems is critically dependent on the memory hierarchy performance. In particular, higher cache hit rate can provide significant performance boos...
Yun Liang, Tulika Mitra
146
Voted
CCCG
2010
15 years 20 days ago
Determining the robustness of sensor barriers
Various notions of coverage provided by wireless sensor networks have attracted considerable attention over the past few years. In general, coverage can be expressed geometrically...
David G. Kirkpatrick
140
Voted
CCS
2010
ACM
15 years 20 days ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
« Prev « First page 15290 / 15404 Last » Next »