Sciweavers

582 search results - page 62 / 117
» A Model for Intuitive Knowledge Sharing
Sort
View
94
Voted
ICPR
2008
IEEE
15 years 10 months ago
Unsupervised writer style adaptation for handwritten word spotting
We propose a novel approach for writer adaptation in a word spotting task. The method exploits the fact that a semi-continuous hidden Markov model separates the word model paramet...
José A. Rodríguez, Florent Perronnin...
119
Voted
FOCS
2000
IEEE
15 years 8 months ago
Zaps and Their Applications
A zap is a two-round, public coin witness-indistinguishable protocol in which the first round, consisting of a message from the verifier to the prover, can be fixed “once and...
Cynthia Dwork, Moni Naor
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 4 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
15 years 10 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi
118
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Performance Comparison of Detection Schemes for MAC Layer Misbehavior
— This paper revisits the problem of detecting greedy behavior in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the Se...
Alvaro A. Cárdenas, Svetlana Radosavac, Joh...