Sciweavers

1094 search results - page 147 / 219
» List signature schemes
Sort
View
WINET
2010
199views more  WINET 2010»
13 years 6 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
TIFS
2010
137views more  TIFS 2010»
13 years 2 months ago
On the dynamic selection of biometric fusion algorithms
Biometric fusion consolidates the output of multiple biometric classifiers to render a decision about the identity of an individual. We consider the problem of designing a fusion s...
Mayank Vatsa, Richa Singh, Afzel Noore, Arun Ross
WWW
2001
ACM
14 years 8 months ago
When experts agree: using non-affiliated experts to rank popular topics
In response to a query a search engine returns a ranked list of documents. If the query is on a popular topic (i.e., it matches many documents) then the returned list is usually t...
Krishna Bharat, George A. Mihaila
CSE
2009
IEEE
14 years 2 months ago
Visually and Acoustically Exploring the High-Dimensional Space of Music
Abstract—The permanent growth of personal music collections caused by the ongoing digital revolution asks for novel ways of organization. Traditional list based approaches are—...
Lukas Bossard, Michael Kuhn 0002, Roger Wattenhofe...
JCO
2008
102views more  JCO 2008»
13 years 7 months ago
Stable matching problems with exchange restrictions
We study variants of classical stable matching problems in which there is an additional requirement for a stable matching, namely that there should not be two participants who wou...
Robert W. Irving