Sciweavers

291 search results - page 42 / 59
» Enforceable social laws
Sort
View
IJBIDM
2010
80views more  IJBIDM 2010»
14 years 8 months ago
Practical algorithms for subgroup detection in covert networks
: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrat...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure...
TPDS
2010
142views more  TPDS 2010»
14 years 7 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
TRUSTBUS
2010
Springer
14 years 7 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
ICIP
2009
IEEE
14 years 7 months ago
Content-based image retrieval: An application to tattoo images
Tattoo images on human body have been routinely collected and used in law enforcement to assist in suspect and victim identification. However, the current practice of matching tat...
Anil K. Jain, Jung-Eun Lee, Rong Jin, Nicholas Gre...
CVPR
2011
IEEE
14 years 5 months ago
Coupled Information-Theoretic Encoding for Face Photo-Sketch Recognition
Automatic face photo-sketch recognition has important applications to law enforcement. Recent research has focused on transforming photos and sketches into the same modality for m...
Wei Zhang, Xiaogang Wang, Xiaoou Tang