Sciweavers

24132 search results - page 4795 / 4827
» and 2009
Sort
View
ICISC
2009
184views Cryptology» more  ICISC 2009»
14 years 7 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ICISS
2009
Springer
14 years 7 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
104
Voted
ICMCS
2009
IEEE
199views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Association rule mining in multiple, multidimensional time series medical data
Time series pattern mining (TSPM) finds correlations or dependencies in same series or in multiple time series. When the numerous instances of multiple time series data are associ...
Gaurav N. Pradhan, B. Prabhakaran
104
Voted
ICMCS
2009
IEEE
179views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Providing QoS support for wireless remote healthcare system
Abstract--Recent advances in wireless sensor technology facilitate the development of remote healthcare systems, which can significantly reduce the healthcare cost. Despite the ini...
Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena B...
ICMCS
2009
IEEE
173views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Linking video ADS with product or service information by web search
With the proliferation of online media services, video ads are pervasive across various platforms involving internet services and interactive TV services. Existing research effort...
Jinqiao Wang, Ling-Yu Duan, Bo Wang, Shi Chen, Yi ...
« Prev « First page 4795 / 4827 Last » Next »