Sciweavers

530 search results - page 40 / 106
» An Introduction to Transfer Learning
Sort
View
ASIACRYPT
2008
Springer
13 years 12 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger
ECRIME
2007
14 years 1 months ago
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...
CVPR
2001
IEEE
14 years 12 months ago
Rapid Object Detection using a Boosted Cascade of Simple Features
This paper describes a machine learning approach for visual object detection which is capable of processing images extremely rapidly and achieving high detection rates. This wor...
Paul A. Viola, Michael J. Jones
CTRSA
2008
Springer
111views Cryptology» more  CTRSA 2008»
13 years 11 months ago
Efficient Fully-Simulatable Oblivious Transfer
Oblivious transfer, first introduced by Rabin, is one of the basic building blocks of cryptographic protocols. In an oblivious transfer (or more exactly, in its 1-out-of-2 variant...
Andrew Y. Lindell
VG
2001
13 years 11 months ago
A Study of Transfer Function Generation for Time-Varying Volume Data
The proper usage and creation of transfer functions for time-varying data sets is an often ignored problem in volume visualization. Although methods and guidelines exist for time-i...
T. J. Jankun-Kelly, Kwan-Liu Ma