Sciweavers

307 search results - page 47 / 62
» Experimental Evaluation of Congestion Avoidance
Sort
View
PR
2010
141views more  PR 2010»
14 years 7 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
104
Voted
ICDE
2011
IEEE
272views Database» more  ICDE 2011»
14 years 4 months ago
A continuous query system for dynamic route planning
—In this paper, we address the problem of answering continuous route planning queries over a road network, in the presence of updates to the delay (cost) estimates of links. A si...
Nirmesh Malviya, Samuel Madden, Arnab Bhattacharya
118
Voted
CIKM
2011
Springer
14 years 23 days ago
Improved answer ranking in social question-answering portals
Community QA portals provide an important resource for non-factoid question-answering. The inherent noisiness of user-generated data makes the identification of high-quality cont...
Felix Hieber, Stefan Riezler
88
Voted
IACR
2011
97views more  IACR 2011»
14 years 13 days ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
ICDAR
2011
IEEE
14 years 12 days ago
BLSTM Neural Network Based Word Retrieval for Hindi Documents
—Retrieval from Hindi document image collections is a challenging task. This is partly due to the complexity of the script, which has more than 800 unique ligatures. In addition,...
Raman Jain, Volkmar Frinken, C. V. Jawahar, Raghav...