Sciweavers

1277 search results - page 202 / 256
» The Google Similarity Distance
Sort
View
IMC
2009
ACM
15 years 4 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
ICPR
2008
IEEE
15 years 4 months ago
Face age estimation using patch-based hidden Markov model supervectors
Recent studies in patch-based Gaussian Mixture Model (GMM) approaches for face age estimation present promising results. We propose using a hidden Markov model (HMM) supervector t...
Xiaodan Zhuang, Xi Zhou, Mark Hasegawa-Johnson, Th...
ICPR
2008
IEEE
15 years 4 months ago
Monocular multi-human detection using Augmented Histograms of Oriented Gradients
We introduce an Augmented Histograms of Oriented Gradients (AHOG) feature for human detection from a nonstatic camera. We increase the discriminating power of original Histograms ...
Cheng-Hsiung Chuang, Shih-Shinh Huang, Li-Chen Fu,...
ICPR
2008
IEEE
15 years 4 months ago
Hallucinating facial images and features
In facial image analysis, image resolution is an important factor which has great influence on the performance of face recognition systems. As for lowresolution face recognition p...
Bo Li, Hong Chang, Shiguang Shan, Xilin Chen, Wen ...
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 4 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov