Sciweavers

198 search results - page 38 / 40
» A practical algorithm for constructing oblivious routing sch...
Sort
View
GLOBECOM
2007
IEEE
15 years 3 months ago
Performing Packet Content Inspection by Longest Prefix Matching Technology
—This article presents a novel mechanism to perform packet content inspection by longest prefix matching (LPM) technology. It is done by transforming the automaton-based state ta...
Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen H...
PR
2010
220views more  PR 2010»
14 years 8 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
JISE
2010
144views more  JISE 2010»
14 years 4 months ago
Variant Methods of Reduced Set Selection for Reduced Support Vector Machines
In dealing with large datasets the reduced support vector machine (RSVM) was proposed for the practical objective to overcome the computational difficulties as well as to reduce t...
Li-Jen Chien, Chien-Chung Chang, Yuh-Jye Lee
92
Voted
IACR
2011
111views more  IACR 2011»
13 years 9 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
15 years 9 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...