Sciweavers

252 search results - page 49 / 51
» On Robust Key Agreement Based on Public Key Authentication
Sort
View
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
13 years 11 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
ICPR
2010
IEEE
13 years 11 months ago
The Fusion of Deep Learning Architectures and Particle Filtering Applied to Lip Tracking
This work introduces a new pattern recognition model for segmenting and tracking lip contours in video sequences. We formulate the problem as a general nonrigid object tracking me...
Gustavo Carneiro, Jacinto Nascimento
BMVC
2010
13 years 5 months ago
Discriminative Topics Modelling for Action Feature Selection and Recognition
This paper presents a framework for recognising realistic human actions captured from unconstrained environments. The novelties of this work lie in three aspects. First, we propos...
Matteo Bregonzio, Jian Li, Shaogang Gong, Tao Xian...
COST
2009
Springer
178views Multimedia» more  COST 2009»
13 years 11 months ago
Fusion of Movement Specific Human Identification Experts
Abstract. In this paper a multi-modal method for human identification that exploits the discriminant features derived from several movement types performed from the same human is p...
Nikolaos Gkalelis, Anastasios Tefas, Ioannis Pitas
IMC
2009
ACM
14 years 2 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...