Sciweavers

32 search results - page 2 / 7
» Early Recognition of Encrypted Applications
Sort
View
MINENET
2005
ACM
15 years 6 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
161
Voted
ICISC
2009
184views Cryptology» more  ICISC 2009»
14 years 10 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ILP
1998
Springer
15 years 4 months ago
Application of Inductive Logic Programming to Discover Rules Governing the Three-Dimensional Topology of Protein Structure
Abstract. Inductive Logic Programming (ILP) has been applied to discover rules governing the three-dimensional topology of protein structure. The data-set unifies two sources of in...
Marcel Turcotte, Stephen Muggleton, Michael J. E. ...
CCS
2010
ACM
15 years 23 days ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
ISMIR
2003
Springer
133views Music» more  ISMIR 2003»
15 years 5 months ago
Chord segmentation and recognition using EM-trained hidden markov models
Automatic extraction of content description from commercial audio recordings has a number of important applications, from indexing and retrieval through to novel musicological ana...
Alexander Sheh, Daniel P. W. Ellis