Sciweavers

6555 search results - page 1309 / 1311
» Secure attribute-based systems
Sort
View
IANDC
2011
129views more  IANDC 2011»
13 years 22 days ago
Rigid tree automata and applications
We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a res...
Florent Jacquemard, Francis Klay, Camille Vacher
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 22 days ago
Data Cleaning and Query Answering with Matching Dependencies and Matching Functions
Matching dependencies were recently introduced as declarative rules for data cleaning and entity resolution. Enforcing a matching dependency on a database instance identifies the ...
Leopoldo E. Bertossi, Solmaz Kolahi, Laks V. S. La...
TMM
2011
146views more  TMM 2011»
13 years 21 days ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
SOICT
2010
13 years 15 days ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
TIP
2010
170views more  TIP 2010»
13 years 14 days ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
« Prev « First page 1309 / 1311 Last » Next »