Sciweavers

977 search results - page 77 / 196
» Soft Constraints for Security
Sort
View
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
14 years 11 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
CCS
2011
ACM
13 years 10 months ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
EDBT
2004
ACM
162views Database» more  EDBT 2004»
15 years 10 months ago
Non-contiguous Sequence Pattern Queries
Abstract. Non-contiguous subsequence pattern queries search for symbol instances in a long sequence that satisfy some soft temporal constraints. In this paper, we propose a methodo...
Nikos Mamoulis, Man Lung Yiu
ICPR
2010
IEEE
15 years 5 months ago
Typographical Features for Scene Text Recognition
Scene text images feature an abundance of font style variety but a dearth of data in any given query. Recognition methods must be robust to this variety or adapt to the query data...
Jerod Weinman
CDC
2008
IEEE
117views Control Systems» more  CDC 2008»
15 years 4 months ago
Stability of model predictive control based on reduced-order models
— In this paper, we present a systematic procedure for obtaining closed-loop stable output-feedback model predictive control based on reduced-order models. The design uses linear...
Svein Hovland, Christian Løvaas, Jan Tommy ...