Sciweavers

1186 search results - page 84 / 238
» A New Approach to Secure Logging
Sort
View
INFOCOM
2011
IEEE
14 years 4 months ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
ASIACRYPT
2007
Springer
15 years 6 months ago
Multi-party Indirect Indexing and Applications
Abstract. We develop a new multi-party generalization of Naor-Nissim indirect indexing, making it possible for many participants to simulate a RAM machine with only poly-logarithmi...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
127
Voted
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 10 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
118
Voted
ICIP
2003
IEEE
16 years 2 months ago
Optical flow estimation based on the extraction of motion patterns
In this paper, a new methodology for optical flow estimation that is able to represent multiple motions is presented. To separate motions at the same location, a new frequency-dom...
Jesús Chamorro-Martínez, Joaqu&iacut...
95
Voted
CHI
2005
ACM
16 years 1 months ago
Learning user interest for image browsing on small-form-factor devices
Mobile devices which can capture and view pictures are becoming increasingly common in our life. The limitation of these small-form-factor devices makes the user experience of ima...
Xing Xie, Hao Liu, Simon Goumaz, Wei-Ying Ma