Sciweavers

1610 search results - page 233 / 322
» Identity Based Multisignatures
Sort
View
IWPC
2009
IEEE
14 years 5 months ago
Standing on the shoulders of giants - A data fusion approach to design pattern detection
Identification of design patterns can deliver important information to designers. Therefore, automated design pattern detection (DPD) is highly desirable when it comes to underst...
Günter Kniesel, Alexander Binun
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 5 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
CIKM
2009
Springer
14 years 5 months ago
Large margin transductive transfer learning
Recently there has been increasing interest in the problem of transfer learning, in which the typical assumption that training and testing data are drawn from identical distributi...
Brian Quanz, Jun Huan
ESTIMEDIA
2009
Springer
14 years 5 months ago
The wizard of OS: a heartbeat for Legacy multimedia applications
—Multimedia applications are often characterised by implicit temporal constraints but, in many cases, they are not programmed using any specialised real-time API. These “Legacy...
Tommaso Cucinotta, Luca Abeni, Luigi Palopoli, Fab...
IDA
2009
Springer
14 years 5 months ago
Learning Natural Image Structure with a Horizontal Product Model
We present a novel extension to Independent Component Analysis (ICA), where the data is generated as the product of two submodels, each of which follow an ICA model, and which comb...
Urs Köster, Jussi T. Lindgren, Michael Gutman...