Sciweavers

849 search results - page 143 / 170
» Completely Non-malleable Schemes
Sort
View
VLSISP
2008
239views more  VLSISP 2008»
13 years 8 months ago
An Embedded Real-Time Surveillance System: Implementation and Evaluation
This paper presents the design of an embedded automated digital video surveillance system with real-time performance. Hardware accelerators for video segmentation, morphological op...
Fredrik Kristensen, Hugo Hedberg, Hongtu Jiang, Pe...
NAR
2011
235views Computer Vision» more  NAR 2011»
12 years 12 months ago
P2CS: a database of prokaryotic two-component systems
P2CS (http://www.p2cs.org) is a specialized database for prokaryotic two-component systems (TCSs), virtually ubiquitous signalling proteins which regulate a wide range of physiolo...
Mohamed Barakat, Philippe Ortet, David E. Whitwort...
ICCV
2011
IEEE
12 years 9 months ago
Adaptive Deconvolutional Networks for Mid and High Level Feature Learning
We present a hierarchical model that learns image decompositions via alternating layers of convolutional sparse coding and max pooling. When trained on natural images, the layers ...
Matthew D. Zeiler, Graham W. Taylor, Rob Fergus
IACR
2011
121views more  IACR 2011»
12 years 8 months ago
Two RFID Privacy Models in Front of a Court
In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited...
Mohammad Hassan Habibi, Mohammad Reza Aref
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 9 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias