Sciweavers

347 search results - page 15 / 70
» On private computation in incomplete networks
Sort
View
SIBGRAPI
1999
IEEE
13 years 12 months ago
An Image Processing and Belief Network Approach to Face Detection
This work describes an approach for face detection, which is the rst stage of any fully automatedhumanface recognition system. We propose several enhancements to a feature-based ap...
Paulo Sérgio de Souza Coelho, Claudio Esper...
WWW
2008
ACM
14 years 8 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
PAKDD
2010
ACM
128views Data Mining» more  PAKDD 2010»
14 years 13 days ago
Privacy-Preserving Network Aggregation
Abstract. Consider the scenario where information about a large network is distributed across several different parties or commercial entities. Intuitively, we would expect that th...
Troy Raeder, Marina Blanton, Nitesh V. Chawla, Kei...
EUROCRYPT
1999
Springer
13 years 12 months ago
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yongge Wang, Yvo Desmedt
ASIACRYPT
1999
Springer
13 years 12 months ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang