Sciweavers

242 search results - page 42 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
15 years 2 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
ICDE
2009
IEEE
136views Database» more  ICDE 2009»
15 years 11 months ago
A Concise Representation of Range Queries
Abstract--With the advance of wireless communication technology, it is quite common for people to view maps or get related services from the handheld devices, such as mobile phones...
Ke Yi, Xiang Lian, Feifei Li, Lei Chen 0002
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
15 years 10 months ago
A Framework for Clustering Uncertain Data Streams
Abstract-- In recent years, uncertain data management applications have grown in importance because of the large number of hardware applications which measure data approximately. F...
Charu C. Aggarwal, Philip S. Yu
WWW
2008
ACM
15 years 10 months ago
Web graph similarity for anomaly detection (poster)
Web graphs are approximate snapshots of the web, created by search engines. Their creation is an error-prone procedure that relies on the availability of Internet nodes and the fa...
Panagiotis Papadimitriou 0002, Ali Dasdan, Hector ...
APCCAS
2006
IEEE
268views Hardware» more  APCCAS 2006»
15 years 3 months ago
A One-Dimensional Technique for Embedding Data in A JPEG Color Image
—A method of embedding data in a JPEG color image for applications such as authentication of an employee carrying a picture identification card is described. Embedding of data, s...
Kaliappan Gopalan