Sciweavers

298 search results - page 30 / 60
» Computer security: quality rather than quantity
Sort
View
WACV
2008
IEEE
14 years 4 months ago
Iris Extraction Based on Intensity Gradient and Texture Difference
Biometrics has become more and more important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy. Succ...
Guodong Guo, Michael J. Jones
ISVC
2009
Springer
14 years 4 months ago
Image Compression Based on Visual Saliency at Individual Scales
5th International Symposium on Visual Computing, Las Vegas, Nevada, USA, Nov 30 - Dec 2, 2009 The goal of lossy image compression ought to be reducing entropy while preserving the...
Stella X. Yu, Dimitri A. Lisin
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
13 years 10 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
RECOMB
2009
Springer
14 years 10 months ago
How Many Bootstrap Replicates Are Necessary?
Phylogenetic Bootstrapping (BS) is a standard technique for inferring confidence values on phylogenetic trees that is based on reconstructing many trees from minor variations of th...
Nicholas D. Pattengale, Masoud Alipour, Olaf R. P....
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
14 years 4 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup