Sciweavers

8301 search results - page 1553 / 1661
» Risk-Aware Information Retrieval
Sort
View
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
14 years 3 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
ADBIS
2004
Springer
147views Database» more  ADBIS 2004»
14 years 3 months ago
A Hybrid Keyword Search across Peer-to-Peer Federated Databases
The need for Keyword search in databases is suggested both by Web integration with legacy database management system and by dynamic Web publication. However, it sacrifices the inh...
Jungkee Kim, Geoffrey Fox
CCS
2004
ACM
14 years 3 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
CIVR
2004
Springer
200views Image Analysis» more  CIVR 2004»
14 years 3 months ago
HMM Model Selection Issues for Soccer Video
There has been a concerted effort from the Video Retrieval community to develop tools that automate the annotation process of Sports video. In this paper, we provide an in-depth i...
Mark Baillie, Joemon M. Jose, Cornelis Joost van R...
CMMR
2004
Springer
98views Music» more  CMMR 2004»
14 years 3 months ago
Separating Voices in Polyphonic Music: A Contig Mapping Approach
Abstract. Voice separation is a critical component of music information retrieval, music analysis and automated transcription systems. We present a contig mapping approach to voice...
Elaine Chew, Xiaodan Wu
« Prev « First page 1553 / 1661 Last » Next »