Sciweavers

2635 search results - page 474 / 527
» Algorithms for the Database Layout Problem
Sort
View
126
Voted
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
15 years 9 months ago
Accurate Palmprint Recognition Using Spatial Bags of Local Layered Descriptors
Abstract. State-of-the-art palmprint recognition algorithms achieve high accuracy based on component based texture analysis. However, they are still sensitive to local variations o...
Yufei Han, Tieniu Tan, Zhenan Sun
103
Voted
DOCENG
2009
ACM
15 years 9 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
153
Voted
HASE
2008
IEEE
15 years 9 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
142
Voted
ITNG
2008
IEEE
15 years 9 months ago
An Efficient Technique for Distance Computation in Road Networks
With recent advances in wireless communication and position technologies, it became possible to collect and record trajectories of moving objects. Thus, many services in road netw...
Xu Jianqiu, Victor Teixeira de Almeida, Qin Xiaoli...
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 9 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov