Sciweavers

2421 search results - page 423 / 485
» Message from the Co-Chairs
Sort
View
ACCV
2007
Springer
14 years 3 months ago
Multi-camera People Tracking by Collaborative Particle Filters and Principal Axis-Based Integration
This paper presents a novel approach to tracking people in multiple cameras. A target is tracked not only in each camera but also in the ground plane by individual particle filter...
Wei Du, Justus H. Piater
ACISP
2007
Springer
14 years 3 months ago
Hash-and-Sign with Weak Hashing Made Secure
Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...
Sylvain Pasini, Serge Vaudenay
ACISP
2007
Springer
14 years 3 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
AIED
2007
Springer
14 years 3 months ago
Can a Polite Intelligent Tutoring System Lead to Improved Learning Outside of the Lab?
In this work we are investigating the learning benefits of e-Learning principles (a) within the context of a web-based intelligent tutor and (b) in the “wild,” that is, in real...
Bruce M. McLaren, Sung-Joo Lim, David Yaron, Kenne...
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 3 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang