Sciweavers

4184 search results - page 765 / 837
» A Data Transformation System for Biological Data Sources
Sort
View
TIFS
2010
173views more  TIFS 2010»
13 years 8 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
13 years 1 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
TNC
2004
120views Education» more  TNC 2004»
13 years 11 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
HT
2011
ACM
13 years 1 months ago
Social capital increases efficiency of collaboration among Wikipedia editors
In this study we measure the impact of pre-existing social capital on the efficiency of collaboration among Wikipedia editors. To construct a social network among Wikipedians we l...
Keiichi Nemoto, Peter A. Gloor, Rob Laubacher
ICIP
2007
IEEE
14 years 12 months ago
Geometric Calibration of Third-Generation Computed Tomography Scanners from Scans of Unknown Objects using Complementary Rays
To achieve good image quality for computed tomography scans, it is important to accurately know the geometrical relationship between the x-ray source, detector, and axis of rotati...
Kevin M. Holt