Sciweavers

29143 search results - page 5750 / 5829
» A Sortation System Model
Sort
View
CCS
2006
ACM
14 years 2 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
ETRA
2004
ACM
134views Biometrics» more  ETRA 2004»
14 years 2 months ago
Visual deictic reference in a collaborative virtual environment
This paper evaluates the use of Visual Deictic Reference (VDR) in Collaborative Virtual Environments (CVEs). A simple CVE capable of hosting two (or more) participants simultaneou...
Andrew T. Duchowski, Nathan Cournia, Brian Cumming...
CLEF
2006
Springer
14 years 2 months ago
MorphoSaurus in ImageCLEF 2006: The Effect of Subwords On Biomedical IR
We here describe the subword approach we used in the 2006 ImageCLEF Medical Image Retrieval task. It is based on the assupmtion that neither fully inflected nor automatically stem...
Philipp Daumke, Jan Paetzold, Kornél G. Mar...
FGR
2004
IEEE
126views Biometrics» more  FGR 2004»
14 years 2 months ago
Trainable Videorealistic Speech Animation
We describe how to create with machine learning techniques a generative, videorealistic, speech animation module. A human subject is first recorded using a videocamera as he/she u...
Tony Ezzat, Gadi Geiger, Tomaso Poggio
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
14 years 2 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
« Prev « First page 5750 / 5829 Last » Next »