Sciweavers

511 search results - page 26 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
130
Voted
CISST
2003
128views Hardware» more  CISST 2003»
15 years 5 months ago
Fast Correspondence-Based System for 2-D Shape Classification
In earlier work, we developed a fast method for 2-D shape retrieval based on point correspondences of silhouette contours. That method did not assume that the database shapes had ...
Boaz J. Super
136
Voted
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 10 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
135
Voted
IRI
2006
IEEE
15 years 9 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
15 years 3 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
146
Voted
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
13 years 11 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke