Sciweavers

455 search results - page 34 / 91
» Differential Privacy in New Settings
Sort
View
PG
2007
IEEE
15 years 3 months ago
Fast and Faithful Geometric Algorithm for Detecting Crest Lines on Meshes
A new geometry-based finite difference method for a fast and reliable detection of perceptually salient curvature extrema on surfaces approximated by dense triangle meshes is pro...
Shin Yoshizawa, Alexander G. Belyaev, Hideo Yokota...
101
Voted
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 1 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
ESORICS
2009
Springer
15 years 4 months ago
Untraceable Tags Based on Mild Assumptions
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
ESORICS
2006
Springer
15 years 1 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
72
Voted
ICIP
2009
IEEE
15 years 10 months ago
Efficient Multivariate Skellam Shrinkage For Denoising Photon-limited Image Data: An Empirical Bayes Approach
In this article we address the issue of denoising photon-limited image data by deriving new and efficient multivariate Bayesian estimators that approximate the conditional expecta...