Sciweavers

2647 search results - page 519 / 530
» Solving Term Inequalities
Sort
View
EDBT
2010
ACM
181views Database» more  EDBT 2010»
13 years 6 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
ITIIS
2010
240views more  ITIIS 2010»
13 years 5 months ago
Super-Resolution Iris Image Restoration using Single Image for Iris Recognition
Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; howeve...
Kwang Yong Shin, Byung Jun Kang, Kang Ryoung Park
MM
2010
ACM
150views Multimedia» more  MM 2010»
13 years 5 months ago
Photo2Trip: generating travel routes from geo-tagged photos for trip planning
Travel route planning is an important step for a tourist to prepare his/her trip. As a common scenario, a tourist usually asks the following questions when he/she is planning his/...
Xin Lu, Changhu Wang, Jiang-Ming Yang, Yanwei Pang...
MP
2010
119views more  MP 2010»
13 years 5 months ago
Efficient and fair routing for mesh networks
Inspired by the One Laptop Per Child project, we consider mesh networks that connect devices that cannot recharge their batteries easily. We study how the mesh should retransmit in...
Andrea Lodi, Enrico Malaguti, Nicolás E. St...
SACMAT
2010
ACM
13 years 5 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...