Sciweavers

5450 search results - page 167 / 1090
» Personalization of tagging systems
Sort
View
HCI
2007
15 years 5 months ago
MyView: Personalized Event Retrieval and Video Compositing from Multi-camera Video Images
Abstract. Video retrieval continues to be one of the most exciting research areas in the field of multimedia technology. With the advancement of sensing and tracking technologies i...
Cheng Chris Zhang, Sung-Bae Cho, Sidney Fels
IJCMAM
2010
160views more  IJCMAM 2010»
15 years 1 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 11 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ICFP
1999
ACM
15 years 8 months ago
Type Dispatch for Named Hierarchical Types
Type dispatch constructs are an important feature of many programming languages. Scheme has predicates for testing the runtime type of a value. Java has a class cast expression an...
Neal Glew
AINA
2006
IEEE
15 years 8 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer