Sciweavers

3299 search results - page 591 / 660
» A general mathematics of names
Sort
View
CCS
2009
ACM
15 years 6 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
CCS
2009
ACM
15 years 6 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 6 months ago
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP)
Anomalous windows are the contiguous groupings of data points. In this paper, we propose an approach for discovering anomalous windows using Scan Statistics for Linear Intersectin...
Lei Shi, Vandana Pursnani Janeja
KDD
2009
ACM
257views Data Mining» more  KDD 2009»
15 years 6 months ago
Argo: intelligent advertising by mining a user's interest from his photo collections
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...
CRV
2009
IEEE
184views Robotics» more  CRV 2009»
15 years 6 months ago
IceSynth: An Image Synthesis System for Sea-Ice Segmentation Evaluation
An ongoing challenge in automatic sea-ice monitoring using synthetic aperture radar (SAR) is the automatic segmentation of SAR sea-ice images based on the underlying ice type. Giv...
Alexander Wong, Wen Zhang, David A. Clausi