Sciweavers

1988 search results - page 248 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
125
Voted
ICCV
2007
IEEE
16 years 4 months ago
Localizing Unordered Panoramic Images Using the Levenshtein Distance
This paper proposes a feature-based method for recovering the relative positions of the viewpoints of a set of panoramic images for which no a priori order information is availabl...
Damien Michel, Antonis A. Argyros, Manolis I. A. L...
PAKDD
2010
ACM
128views Data Mining» more  PAKDD 2010»
15 years 7 months ago
Privacy-Preserving Network Aggregation
Abstract. Consider the scenario where information about a large network is distributed across several different parties or commercial entities. Intuitively, we would expect that th...
Troy Raeder, Marina Blanton, Nitesh V. Chawla, Kei...
123
Voted
MSWIM
2006
ACM
15 years 8 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
SP
2002
IEEE
15 years 2 months ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...
112
Voted
CCS
2009
ACM
15 years 9 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...