Sciweavers

87 search results - page 3 / 18
» Using Delay to Defend Against Database Extraction
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu
ICPR
2010
IEEE
13 years 5 months ago
3D Face Decomposition and Region Selection Against Expression Variations
3D face recognition exploits shape information as well as texture information in 2D systems. The use of whole 3D face is sensitive to some undesired situations like expression var...
Göksel Günlü, Hasan S. Bilge
SIGMOD
2009
ACM
144views Database» more  SIGMOD 2009»
14 years 7 months ago
Do we mean the same?: disambiguation of extracted keyword queries for database search
Users often try to accumulate information on a topic of interest from multiple information sources. In this case a user's informational need might be expressed in terms of an...
Elena Demidova, Irina Oelze, Peter Fankhauser
FC
2000
Springer
127views Cryptology» more  FC 2000»
13 years 11 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
NDSS
2008
IEEE
14 years 1 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu