Sciweavers

754 search results - page 57 / 151
» Generation of Signatures by Deformations
Sort
View
ICISC
2001
98views Cryptology» more  ICISC 2001»
13 years 10 months ago
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
In this paper, we propose a multi-signature scheme, in which each signer can express her intention associating with the message to be signed. Signers' intentions mean a kind o...
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsu...
JMM2
2006
128views more  JMM2 2006»
13 years 8 months ago
Analysis of Facial Dynamics Using a Tensor Framework
Research has shown that the dynamics of facial motion are important in the perception of gender, identity, and emotion. In this paper we show that it is possible to use a multi-lin...
Lisa Gralewski, Neill W. Campbell, Edward Morrison...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 18 days ago
Continual hashing for efficient fine-grain state inconsistency detection
Transaction-level modeling (TLM) allows a designer to save functional verification effort during the modular refinement of an SoC by reusing the prior implementation of a module a...
Jae W. Lee, Myron King, Krste Asanovic
EDBT
2008
ACM
178views Database» more  EDBT 2008»
14 years 8 months ago
Compacting music signatures for efficient music retrieval
Music information retrieval is becoming very important with the ever-increasing growth of music content in digital libraries, peer-to-peer systems and the internet. While it is ea...
Bin Cui, H. V. Jagadish, Beng Chin Ooi, Kian-Lee T...
ICIW
2009
IEEE
14 years 3 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...