Sciweavers

32 search results - page 2 / 7
» Early Recognition of Encrypted Applications
Sort
View
MINENET
2005
ACM
13 years 11 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
ICISC
2009
184views Cryptology» more  ICISC 2009»
13 years 3 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ILP
1998
Springer
13 years 9 months ago
Application of Inductive Logic Programming to Discover Rules Governing the Three-Dimensional Topology of Protein Structure
Abstract. Inductive Logic Programming (ILP) has been applied to discover rules governing the three-dimensional topology of protein structure. The data-set unifies two sources of in...
Marcel Turcotte, Stephen Muggleton, Michael J. E. ...
CCS
2010
ACM
13 years 5 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
ISMIR
2003
Springer
133views Music» more  ISMIR 2003»
13 years 10 months ago
Chord segmentation and recognition using EM-trained hidden markov models
Automatic extraction of content description from commercial audio recordings has a number of important applications, from indexing and retrieval through to novel musicological ana...
Alexander Sheh, Daniel P. W. Ellis