Sciweavers

121 search results - page 19 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View

Lab
641views
15 years 6 months ago
Computational Biomedicine Lab
www.cbl.uh.edu The Computational Biomedicine Lab (CBL) was established in 1997 at the University of Houston and is committed to excellence in image analysis, with an emphasis on ap...
ICPR
2006
IEEE
14 years 11 months ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar
ICPR
2004
IEEE
14 years 11 months ago
Object Class Recognition using Images of Abstract Regions
lass Recognition using Images of Abstract Regions Yi Li, Jeff A. Bilmes, and Linda G. Shapiro Department of Computer Science and Engineering Department of Electrical Engineering Un...
Jeff A. Bilmes, Linda G. Shapiro, Yi Li
ICSE
2008
IEEE-ACM
14 years 10 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...
POPL
2010
ACM
14 years 7 months ago
Contracts Made Manifest
Since Findler and Felleisen [2002] introduced higher-order contracts, many variants have been proposed. Broadly, these fall into two groups: some follow Findler and Felleisen in u...
Benjamin C. Pierce, Michael Greenberg, Stephanie W...