Search For:

Displaying 1-9 out of 9 total
Essential Pages
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Ashwin Swaminathan, Cherian V. Mathew, Darko Kirovski
Issue Date:September 2009
pp. 173-182
Results to Web search queries are ranked using heuristics that typically analyze the global link topology, user behavior, and content relevance. We point to a particular inefficiency of such methods: information redundancy. In queries where learning about ...
 
Relating Reputation and Money in On-line Markets
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Ashwin Swaminathan, Renan G. Cattelan, Cherian V. Mathew, Ydo Wexler, Darko Kirovski
Issue Date:September 2009
pp. 639-646
Reputation in on-line economic systems is typically quantified using counters that specify positive and negative feedback from past transactions and/or some form of transaction network analysis that aims to quantify the likelihood that a network user will ...
 
Secure image retrieval through feature protection
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, Min Wu
Issue Date:April 2009
pp. 1533-1536
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focuses on image feature protection techniques which enable similarity comparison a...
 
Tampering identification using Empirical Frequency Response
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Wei-Hong Chuang, Ashwin Swaminathan, Min Wu
Issue Date:April 2009
pp. 1517-1520
With the widespread popularity of digital images and the presence of easy-to-use image editing software, content integrity can no longer be taken for granted, and there is a strong need for techniques that not only detect the presence of tampering but also...
 
Information-theoretic database building and querying for mobile Augmented Reality applications
Found in: Mixed and Augmented Reality, IEEE / ACM International Symposium on
By Pawan K. Baheti,Ashwin Swaminathan,Murali Chari,Serafin Diaz,Slawek Grzechnik
Issue Date:October 2011
pp. 47-53
Recently, there has been tremendous interest in the area of mobile Augmented Reality (AR) with applications including navigation, social networking, gaming and education. Current generation mobile phones are equipped with camera, GPS and other sensors, e.g...
 
A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing
Found in: Statistical Signal Processing, IEEE/SP Workshop on
By Min Wu, Yinian Mao, Ashwin Swaminathan
Issue Date:August 2007
pp. 166-170
An image hash is a content-based compact representation of an image and finds applications in image authentication, watermarking, and image similarity comparison. This paper reviews representative approaches developed by the research community in construct...
 
Relating Reputation and Money in Online Markets
Found in: ACM Transactions on the Web (TWEB)
By Ashwin Swaminathan, Cherian V. Mathew, Darko Kirovski, Renan G. Cattelan, Ydo Wexler
Issue Date:September 2010
pp. 1-31
Reputation in online economic systems is typically quantified using counters that specify positive and negative feedback from past transactions and/or some form of transaction network analysis that aims to quantify the likelihood that a network user will c...
     
A decision theoretic framework for analyzing binary hash-based content identification systems
Found in: Proceedings of the 8th ACM workshop on Digital rights management (DRM '08)
By Ashwin Swaminathan, Avinash L. Varna, Min Wu
Issue Date:October 2008
pp. 53-58
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of content. Several content identification techniques based on watermarking or r...
     
Confidentiality-preserving rank-ordered search
Found in: Proceedings of the 2007 ACM workshop on Storage security and survivability (StorageSS '07)
By Ashwin Swaminathan
Issue Date:October 2007
pp. 7-12
This paper introduces a new framework for confidentiality preserving rank-ordered search and retrieval over large document collections. The proposed framework not only protects document/query confidentiality against an outside intruder, but also prevents a...
     
 1