Sciweavers

243 search results - page 48 / 49
» Privacy Preserving in Clustering using Fuzzy Sets
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
APGV
2004
ACM
179views Visualization» more  APGV 2004»
14 years 26 days ago
Example-based color stylization based on categorical perception
We describe a new computational approach to stylize the colors of an image by using a reference image. During processing, we take characteristics of human color perception into ac...
Youngha Chang, Keiji Uchikawa, Suguru Saito
IPM
2007
145views more  IPM 2007»
13 years 7 months ago
Text mining techniques for patent analysis
Patent documents contain important research results. However, they are lengthy and rich in technical terminology such that it takes a lot of human efforts for analyses. Automatic...
Yuen-Hsien Tseng, Chi-Jen Lin, Yu-I Lin
CCS
2009
ACM
14 years 8 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
TIT
2010
138views Education» more  TIT 2010»
13 years 2 months ago
Functional compression through graph coloring
Motivated by applications to sensor networks and privacy preserving databases, we consider the problem of functional compression. The objective is to separately compress possibly c...
Vishal Doshi, Devavrat Shah, Muriel Médard,...