Sciweavers

6555 search results - page 934 / 1311
» Secure attribute-based systems
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 7 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 5 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
ICPR
2008
IEEE
15 years 11 months ago
Enhanced speaker recognition based on intra-modal fusion and accent modeling
Speaker recognition systems, even though they have been around for four decades, have not been widely considered as standalone systems for biometric security because of their unac...
Srikanth Mangayyagari, Tanmoy Islam, Ravi Sankar
ICB
2007
Springer
110views Biometrics» more  ICB 2007»
15 years 11 months ago
Comparison of Compression Algorithms' Impact on Iris Recognition Accuracy
The impact of using different lossy compression algorithms on the matching accuracy of iris recognition systems is investigated. In particular, we relate rate-distortion performan...
Stefan Matschitsch, Martin Tschinder, Andreas Uhl
SRDS
2006
IEEE
15 years 10 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...