Sciweavers

326 search results - page 38 / 66
» Visualization in law enforcement
Sort
View
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 7 days ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
FC
1999
Springer
184views Cryptology» more  FC 1999»
13 years 12 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma
ECCV
2010
Springer
13 years 11 months ago
Lighting and Pose Robust Face Sketch Synthesis
Automatic face sketch synthesis has important applications in law enforcement and digital entertainment. Although great progress has been made in recent years, previous methods onl...
CCS
1994
ACM
13 years 11 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
DMSN
2007
ACM
13 years 11 months ago
A graph-based approach to vehicle tracking in traffic camera video streams
Vehicle tracking has a wide variety of applications, from law enforcement to traffic planning and public safety. However, the image resolution of the videos available from most tr...
Hamid Haidarian Shahri, Galileo Namata, Saket Navl...