Sciweavers

4037 search results - page 392 / 808
» Routing without ordering
Sort
View
129
Voted
KES
2005
Springer
15 years 9 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang
110
Voted
MIDDLEWARE
2005
Springer
15 years 9 months ago
Dual-Quorum Replication for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Dual-quorum replication combines volume leases and qu...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
145
Voted
TRUSTBUS
2005
Springer
15 years 9 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
137
Voted
WEBI
2005
Springer
15 years 9 months ago
HITS is Principal Components Analysis
In this work, we show that Kleinberg’s hubs and authorities model (HITS) is simply Principal Components Analysis (PCA; maybe the most widely used multivariate statistical analys...
Marco Saerens, François Fouss
128
Voted
ACII
2005
Springer
15 years 9 months ago
Facial Expression Recognition Using HLAC Features and WPCA
This paper proposes a new facial expression recognition method which combines Higher Order Local Autocorrelation (HLAC) features with Weighted PCA. HLAC features are computed at ea...
Fang Liu, Zhiliang Wang, Li Wang, Xiuyan Meng