Sciweavers

3210 search results - page 97 / 642
» Secure Similarity Search
Sort
View
PAKDD
2011
ACM
419views Data Mining» more  PAKDD 2011»
14 years 7 months ago
DISC: Data-Intensive Similarity Measure for Categorical Data
Abstract. The concept of similarity is fundamentally important in almost every scientific field. Clustering, distance-based outlier detection, classification, regression and sea...
Aditya Desai, Himanshu Singh, Vikram Pudi
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
15 years 11 months ago
Exploring the Suitability of IS Security Management Standards for SMEs
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standa...
Yves Barlette, Vladislav Fomin
147
Voted
SIGOPSE
2004
ACM
15 years 10 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
138
Voted
SEC
2003
15 years 6 months ago
World Framework for Security Benchmark Changes
: The paper contains presentation of a framework, which would significantly increase quality of information security products and procedures, and Commentary on difficulties of impl...
Lech J. Janczewski, Andrew M. Colarik
ICIP
2002
IEEE
16 years 6 months ago
Efficient video similarity measurement with video signature
The proliferation of video content on the web makes similarity detection an indispensable tool in web data management, searching, and navigation. In this paper, we propose a numbe...
Sen-Ching S. Cheung, Avideh Zakhor