Sciweavers

24188 search results - page 213 / 4838
» Computing on Encrypted Data
Sort
View
121
Voted
GIS
2010
ACM
15 years 2 months ago
INTACT: a spatial query integrity assurance framework for location-based services
It is cost-effective for data owners to publicize their spatial databases via database outsourcing; however, data privacy and query integrity are major challenges. In this demonst...
Chih-Jye Wang, Wei-Shinn Ku, Ling Hu, Cyrus Shahab...
IJCNN
2000
IEEE
15 years 7 months ago
A Training Method with Small Computation for Classification
A training data selection method for multi-class data is proposed. This method can be used for multilayer neural networks (MLNN). The MLNN can be applied to pattern classification...
Kazuyuki Hara, Kenji Nakayama
131
Voted
ICPR
2008
IEEE
16 years 4 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar