Sciweavers

169 search results - page 29 / 34
» Secure image retrieval through feature protection
Sort
View
IJCV
2006
166views more  IJCV 2006»
13 years 8 months ago
Fast Constrained Surface Extraction by Minimal Paths
A new approach performing surface extraction from 3D images under user defined geometrical constraints is presented. The constraints are introduced through boundary curves given by...
Roberto Ardon, Laurent D. Cohen
AGENTS
2000
Springer
14 years 24 days ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
INFOCOM
2010
IEEE
13 years 6 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
IEAAIE
2004
Springer
14 years 1 months ago
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach
This paper investigates the suitability of linear genetic programming (LGP) technique to model efficient intrusion detection systems, while comparing its performance with artificia...
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
NIPS
2004
13 years 9 months ago
Surface Reconstruction using Learned Shape Models
We consider the problem of geometrical surface reconstruction from one or several images using learned shape models. While humans can effortlessly retrieve 3D shape information, t...
Jan Erik Solem, Fredrik Kahl