Sciweavers

1610 search results - page 40 / 322
» Identity Based Multisignatures
Sort
View
JMM2
2006
151views more  JMM2 2006»
13 years 8 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
CCS
2009
ACM
14 years 3 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
BMCBI
2005
67views more  BMCBI 2005»
13 years 8 months ago
Sequence signature analysis of chromosome identity in three Drosophila species
Background: All eukaryotic organisms need to distinguish each of their chromosomes. A few protein complexes have been described that recognise entire, specific chromosomes, for in...
Per Stenberg, Fredrik Pettersson, Anja O. Saura, A...
ICPR
2010
IEEE
13 years 7 months ago
Learning Non-Linear Dynamical Systems by Alignment of Local Linear Models
Abstract—Learning dynamical systems is one of the important problems in many fields. In this paper, we present an algorithm for learning non-linear dynamical systems which works...
Masao Joko, Yoshinobu Kawahara, Takehisa Yairi
INFOCOM
2011
IEEE
12 years 12 months ago
Optimal Sybil-resilient node admission control
—Most existing large-scale networked systems on the Internet such as peer-to-peer systems are vulnerable to Sybil attacks where a single adversary can introduce many bogus identi...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...