Sciweavers

3608 search results - page 341 / 722
» computing 2011
Sort
View
ICCV
2011
IEEE
14 years 5 months ago
Contextual Weighting for Vocabulary Tree based Image Retrieval
In this paper we address the problem of image retrieval from millions of database images. We improve the vocabulary tree based approach by introducing contextual weighting of loca...
Xiaoyu Wang, Ming Yang, Timothee Cour, Shenghuo Zh...
CCS
2011
ACM
14 years 5 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
ARESEC
2011
117views more  ARESEC 2011»
14 years 5 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
CHI
2011
ACM
14 years 8 months ago
I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application
There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the re...
Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jas...
INFOCOM
2011
IEEE
14 years 8 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang