Sciweavers

2309 search results - page 459 / 462
» Using Meta-Structures in Database Design
Sort
View
IACR
2011
115views more  IACR 2011»
12 years 7 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
USS
2010
13 years 5 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel
HCI
2009
13 years 5 months ago
PC-Based Rehabilitation System with Biofeedback
Abstract. The purpose of this research is to emphasize on the concept of integrating computer and interactive technologies to the rehabilitation robotic with biofeedback. First, th...
Chih-Fu Wu, Jeih-Jang Liou
ICIP
2009
IEEE
13 years 5 months ago
A hierarchical graph-based markovian clustering approach for the unsupervised segmentation of textured color images
In this paper, a new unsupervised hierarchical approach to textured color images segmentation is proposed. To this end, we have designed a two-step procedure based on a grey-scale...
Rachid Hedjam, Max Mignotte
CIKM
2010
Springer
13 years 4 months ago
Regularization and feature selection for networked features
In the standard formalization of supervised learning problems, a datum is represented as a vector of features without prior knowledge about relationships among features. However, ...
Hongliang Fei, Brian Quanz, Jun Huan