Sciweavers

14824 search results - page 2798 / 2965
» Security - Introduction
Sort
View
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 19 days ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
ICDE
2001
IEEE
167views Database» more  ICDE 2001»
16 years 19 days ago
Database Managed External File Update
RDBMS's have evolved to an extent that they are used to manage almost all of traditional business data in a robust fashion. Nevertheless, a large fraction of unstructured and...
Neeraj Mittal, Hui-I Hsiao
VIS
2007
IEEE
164views Visualization» more  VIS 2007»
16 years 16 days ago
Contextualized Videos: Combining Videos with Environment Models to Support Situational Understanding
Multiple spatially-related videos are increasingly used in security, communication, and other applications. Since it can be difficult to understand the spatial relationships betwee...
Yi Wang, David A. Krum, Enylton M. Coelho, Doug...
ICPR
2006
IEEE
16 years 11 days ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar
GIS
2005
ACM
16 years 9 days ago
Contraflow network reconfiguration for evacuation planning: a summary of results
Contraflow, or lane reversal, is a way of increasing outbound capacity of a real network by reversing the direction of inbound roads during evacuations. The contraflow is consider...
Sangho Kim, Shashi Shekhar
« Prev « First page 2798 / 2965 Last » Next »