Sciweavers

169 search results - page 18 / 34
» Secure image retrieval through feature protection
Sort
View
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 7 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
MVA
2007
309views Computer Vision» more  MVA 2007»
13 years 7 months ago
Robust Facial Feature Extraction Using Embedded Hidden Markov Model for Face Recognition under Large Pose Variation
We propose an algorithm for extracting facial features robustly from images for face recognition under large pose variation. Rectangular facial features are retrieved via the by-p...
Ping-Han Lee, Yun-Wen Wang, Jison Hsu, Ming-Hsuan ...
CIVR
2005
Springer
205views Image Analysis» more  CIVR 2005»
14 years 28 days ago
Automatic Image Semantic Annotation Based on Image-Keyword Document Model
Abstract. This paper presents a novel method of automatic image semantic annotation. Our approach is based on the Image-Keyword Document Model (IKDM) with image features discretiza...
Xiangdong Zhou, Lian Chen, Jianye Ye, Qi Zhang, Ba...
WIAS
2010
102views more  WIAS 2010»
13 years 5 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
13 years 7 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...