Sciweavers

1080 search results - page 165 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ICDM
2007
IEEE
104views Data Mining» more  ICDM 2007»
15 years 4 months ago
Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical disclosure limitation (SDL) techniques a...
Aleksandra B. Slavkovic, Yuval Nardi, Matthew M. T...
ICA3PP
2007
Springer
15 years 3 months ago
RSM-Based Gossip on P2P Network
Classification is a kind of basic semantics that people often use to manage versatile contents in daily life. Resource Space Model (RSM) is a semantic model for sharing and managin...
Hai Zhuge, Xiang Li
CONEXT
2006
ACM
15 years 3 months ago
Compositional control of IP media
Abstract— In many IP media services, the media channels are point-to-point, dynamic, and set up with the participation of one or more application servers, even though the media p...
Pamela Zave, Eric Cheung
68
Voted
CAIP
2003
Springer
138views Image Analysis» more  CAIP 2003»
15 years 2 months ago
A Face Processing System Based on Committee Machine: The Approach and Experimental Results
Abstract. In this paper, we propose a heterogeneous committee machine for face processing including face detection and recognition. Our proposed system consists of two components, ...
Kim-Fung Jang, Ho-Man Tang, Michael R. Lyu, Irwin ...
WISA
2009
Springer
15 years 2 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar