Sciweavers

5476 search results - page 938 / 1096
» Resettably Secure Computation
Sort
View
ICDCS
2006
IEEE
15 years 10 months ago
Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery Guarantees
Content-based publish/subscribe (pub/sub) is a promising paradigm for building asynchronous distributed applications. In many application scenarios, these systems are required to ...
Yuanyuan Zhao, Daniel C. Sturman
140
Voted
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 10 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...
ICPP
2006
IEEE
15 years 10 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao