Sciweavers

1687 search results - page 199 / 338
» Personalizing Information Spaces: A Metadata Based Approach
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...
CCS
2011
ACM
12 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
IJAHUC
2010
130views more  IJAHUC 2010»
13 years 7 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...
ICPR
2008
IEEE
14 years 3 months ago
Automatic pose estimation of 3D facial models
Pose estimation plays an essential role in many computer vision applications, such as human computer interaction (HCI), driver attentiveness monitoring, face recognition, automati...
Yi Sun, Lijun Yin
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 2 months ago
An Online Video Composition System
This paper presents an information-driven online video composition system. The composition work handled by the system includes dynamically setting multiple pan/tilt/zoom (PTZ) cam...
Qiong Liu, Xiaojin Shi, Don Kimber, Frank Zhao, Fr...