Sciweavers

70 search results - page 9 / 14
» A Note on The Rogers-Fine Identity
Sort
View
PERCOM
2011
ACM
13 years 2 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
PET
2012
Springer
12 years 1 months ago
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...
EUROCRYPT
2003
Springer
14 years 4 months ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
ICASSP
2009
IEEE
14 years 2 months ago
Graphical Models: Statistical inference vs. determination
Using discrete Hidden-Markov-Models (HMMs) for recognition requires the quantization of the continuous feature vectors. In handwritten whiteboard note recognition it turns out tha...
Joachim Schenk, Benedikt Hörnler, Artur Braun...
JUCS
2007
122views more  JUCS 2007»
13 years 10 months ago
Spiking Neural P Systems with Astrocyte-Like Control
: Spiking neural P systems are computing models inspired from the way the neurons communicate by means of spikes, electrical impulses of identical shapes. In this note we consider ...
Gheorghe Paun