Sciweavers

7200 search results - page 1182 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
CCS
2001
ACM
14 years 3 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
CIKM
2001
Springer
14 years 3 months ago
Caching Constrained Mobile Data
As mobile devices get ubiquitous and grow in computational power, their management of interdependent data also becomes increasingly important. The mobile environment exhibits all ...
Subhasish Mazumdar, Mateusz Pietrzyk, Panos K. Chr...
ECML
2001
Springer
14 years 3 months ago
Iterative Double Clustering for Unsupervised and Semi-supervised Learning
We present a powerful meta-clustering technique called Iterative Double Clustering (IDC). The IDC method is a natural extension of the recent Double Clustering (DC) method of Slon...
Ran El-Yaniv, Oren Souroujon
ESMART
2001
Springer
14 years 3 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
IWANN
2001
Springer
14 years 3 months ago
Character Feature Extraction Using Polygonal Projection Sweep (Contour Detection)
It is presented in this paper a new approach to the problem of feature extraction. The approach is based on the edge detection, where a set of feature vectors is taken from the sou...
Roberto J. Rodrigues, Gizelle Kupac Vianna, Antoni...
« Prev « First page 1182 / 1440 Last » Next »