Sciweavers

12194 search results - page 2414 / 2439
» cans 2010
Sort
View
SISAP
2010
IEEE
259views Data Mining» more  SISAP 2010»
13 years 7 months ago
kNN based image classification relying on local feature similarity
In this paper, we propose a novel image classification approach, derived from the kNN classification strategy, that is particularly suited to be used when classifying images descr...
Giuseppe Amato, Fabrizio Falchi
SOCA
2010
IEEE
13 years 7 months ago
Towards a diamond SOA operational model
The triangular operational model with the three roles of service-registry, -provider, and -consumer has been the traditional operational model in Service-oriented Architectures (SO...
Mohammed AbuJarour, Felix Naumann
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
SRDS
2010
IEEE
13 years 7 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
TRIDENTCOM
2010
IEEE
13 years 7 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
« Prev « First page 2414 / 2439 Last » Next »