Sciweavers

16843 search results - page 5 / 3369
» On Generalized Authorization Problems
Sort
View
PAMI
2006
125views more  PAMI 2006»
13 years 7 months ago
The Semantic Pathfinder: Using an Authoring Metaphor for Generic Multimedia Indexing
This paper presents the semantic pathfinder architecture for generic indexing of multimedia archives. The semantic pathfinder extracts semantic concepts from video by exploring dif...
Cees Snoek, Marcel Worring, Jan-Mark Geusebroek, D...
ERCIMDL
2006
Springer
234views Education» more  ERCIMDL 2006»
13 years 11 months ago
Intelligent Bibliography Creation and Markup for Authors: A Step Towards Interoperable Digital Libraries
The move towards integrated international Digital Libraries offers the opportunity of creating comprehensive data on citation networks. These data are not only invaluable pointers ...
Bettina Berendt, Kai Dingel, Christoph Hanser
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 8 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
13 years 11 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
ACSAC
2000
IEEE
14 years 11 days ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao