Sciweavers

3210 search results - page 65 / 642
» Secure Similarity Search
Sort
View
CORR
2004
Springer
144views Education» more  CORR 2004»
14 years 11 months ago
The Google Similarity Distance
Words and phrases acquire meaning from the way they are used in society, from their relative semantics to other words and phrases. For computers the equivalent of `society' is...
Rudi Cilibrasi, Paul M. B. Vitányi
ECCV
2004
Springer
16 years 1 months ago
Human Pose Estimation Using Learnt Probabilistic Region Similarities and Partial Configurations
Abstract. A model of human appearance is presented for efficient pose estimation from real-world images. In common with related approaches, a high-level model defines a space of co...
Timothy J. Roberts, Stephen J. McKenna, Ian W. Ric...
ICIP
2010
IEEE
14 years 9 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
87
Voted
CCS
2009
ACM
16 years 14 days ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
EMNLP
2007
15 years 1 months ago
Inducing Search Keys for Name Filtering
This paper describes ETK (Ensemble of Transformation based Keys) a new algorithm for inducing search keys for name filtering. ETK has the low computational cost and ability to ...
Karl Branting