Sciweavers

59 search results - page 12 / 12
» Can tongue be recovered from face
Sort
View
AIM
2002
13 years 5 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 11 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
CVPR
2003
IEEE
14 years 7 months ago
Kernel Principal Angles for Classification Machines with Applications to Image Sequence Interpretation
We consider the problem of learning with instances defined over a space of sets of vectors. We derive a new positive definite kernel f(A B) defined over pairs of matrices A B base...
Lior Wolf, Amnon Shashua
WS
2005
ACM
13 years 10 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee