Sciweavers

860 search results - page 15 / 172
» Completeness in two-party secure computation: a computationa...
Sort
View
DKE
2008
98views more  DKE 2008»
14 years 9 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright
ICSAP
2009
14 years 7 months ago
Omnidirectional Surveillance System for Digital Home Security
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porc...
Wai Kit Wong, Joanne Tze Yen Liew, Chu Kiong Loo, ...
SIGSOFT
2010
ACM
14 years 7 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
14 years 1 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 3 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...