Sciweavers

1358 search results - page 199 / 272
» Diverse Firewall Design
Sort
View
WWW
2010
ACM
15 years 3 months ago
Diversifying landmark image search results by learning interested views from community photos
In this paper, we demonstrate a novel landmark photo search and browsing system, Agate, which ranks landmark image search results considering their relevance, diversity and qualit...
Yuheng Ren, Mo Yu, Xin-Jing Wang, Lei Zhang, Wei-Y...
LCPC
2000
Springer
15 years 3 months ago
SmartApps: An Application Centric Approach to High Performance Computing
State-of-the-art run-time systems are a poor match to diverse, dynamic distributed applications because they are designed to provide support to a wide variety of applications, with...
Lawrence Rauchwerger, Nancy M. Amato, Josep Torrel...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 3 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
EDBT
2010
ACM
132views Database» more  EDBT 2010»
15 years 3 months ago
Algorithm-safe privacy-preserving data publishing
This paper develops toolsets for eliminating algorithm-based disclosure from existing privacy-preserving data publishing algorithms. We first show that the space of algorithm-base...
Xin Jin, Nan Zhang 0004, Gautam Das
AAAI
2007
15 years 2 months ago
Discovering Near Symmetry in Graphs
Symmetry is a widespread phenomenon that can offer opportunities for powerful exploitation in areas as diverse as molecular chemistry, pure mathematics, circuit design, biology an...
Maria Fox, Derek Long, Julie Porteous