Sciweavers

23 search results - page 4 / 5
» pet 2005
Sort
View
PET
2005
Springer
13 years 10 months ago
Anonymity Preserving Techniques in Trust Negotiations
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
Indrakshi Ray, Elisa Bertino, Anna Cinzia Squiccia...
PET
2005
Springer
13 years 10 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
AIPR
2005
IEEE
13 years 11 months ago
A Fast Piece-wise Deformable Method for Multi-Modality Image Registration
Medical image fusion is becoming increasingly popular for enhancing diagnostic accuracy by intelligently ‘fusing’ information obtained from two different images. These images ...
Girish Gopalakrishnan, S. V. Bharath Kumar, Ajay N...
WEBI
2005
Springer
13 years 10 months ago
QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software
We present a generic natural language processing (NLP) architecture, acronym QTIL, based on a system of cooperating multiple agents (Q/A, T, I, and L agents) which can be used in ...
Vlado Keselj, Dawn N. Jutla
MICCAI
2005
Springer
14 years 6 months ago
Respiratory Motion Correction in Emission Tomography Image Reconstruction
In Emission Tomography imaging, respiratory motion causes artifacts in lungs and cardiac reconstructed images, which lead to misinterpretations and imprecise diagnosis. Solutions l...
Mauricio Reyes, Grégoire Malandain, Pierre ...