Sciweavers

121 search results - page 7 / 25
» Data Assurance in Opaque Computations
Sort
View
96
Voted
TKDE
2008
121views more  TKDE 2008»
14 years 11 months ago
Schema Matching Using Interattribute Dependencies
Schema matching is one of the key challenges in information integration. It is a labor-intensive and time-consuming process. To alleviate the problem, many automated solutions have...
Jaewoo Kang, Jeffrey F. Naughton
JVCA
2000
232views more  JVCA 2000»
14 years 11 months ago
Realistic surface reconstruction of 3D scenes from uncalibrated image sequences
This contribution addresses the problem of obtaining 3D models from image sequences. A 3D surface description of the scene is extracted completely from a set of uncalibrated camer...
Reinhard Koch, Marc Pollefeys, Luc J. Van Gool
112
Voted
SOCIALCOM
2010
14 years 6 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
SAC
2004
ACM
15 years 5 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
SAC
2010
ACM
15 years 6 months ago
CNL4DSA: a controlled natural language for data sharing agreements
A Data Sharing Agreement (DSA) is an agreement among contracting parties regulating how they share data. A DSA represents a flexible mean to assure privacy of data exchanged on t...
Ilaria Matteucci, Marinella Petrocchi, Marco Luca ...