Sciweavers

311 search results - page 29 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
WWW
2003
ACM
16 years 2 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
CCS
2007
ACM
15 years 7 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
ISCAS
2005
IEEE
140views Hardware» more  ISCAS 2005»
15 years 7 months ago
Macroblock-based algorithm for dual-bitstream MPEG video streaming with VCR functionalities
— Reverse playback is the most common video cassette recording (VCR) functions in many digital video players. However, the predictive processing techniques employed in MPEG sever...
Tak-Piu Ip, Yui-Lam Chan, Chang-Hong Fu, Wan-Chi S...
93
Voted
CCS
2004
ACM
15 years 6 months ago
Pong-cache poisoning in GUESS
This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources resilient to coord...
Neil Daswani, Hector Garcia-Molina
FGR
2000
IEEE
141views Biometrics» more  FGR 2000»
15 years 5 months ago
Memory-Based Face Recognition for Visitor Identification
We show that a simple, memory-based technique for appearance-based face recognition, motivated by the realworld task of visitor identification, can outperform more sophisticated a...
Terence Sim, Rahul Sukthankar, Matthew D. Mullin, ...