Sciweavers

1663 search results - page 224 / 333
» Privacy and Identity Management
Sort
View
142
Voted
UAI
2003
15 years 6 months ago
The Information Bottleneck EM Algorithm
Learning with hidden variables is a central challenge in probabilistic graphical models that has important implications for many real-life problems. The classical approach is usin...
Gal Elidan, Nir Friedman
IJMMS
2008
99views more  IJMMS 2008»
15 years 4 months ago
Storied spaces: Cultural accounts of mobility, technology, and environmental knowing
When we think of mobility in technical terms, we think of topics such as bandwidth, resource management, location, and wireless networks. When we think of mobility in social or cu...
Johanna Brewer, Paul Dourish
ISCI
2008
160views more  ISCI 2008»
15 years 4 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
AMI
2010
Springer
15 years 3 months ago
A Distributed Many-Camera System for Multi-person Tracking
This article presents a modular, distributed and scalable many-camera system designed towards tracking multiple people simultaneously in a natural human-robot interaction scenario ...
Claus Lenz, Thorsten Röder, Martin Eggers, Si...
143
Voted
BIOSIG
2009
102views Biometrics» more  BIOSIG 2009»
15 years 2 months ago
SAMLizing the European Citizen Card
: While the use of Federated Identity Management and Single Sign-On based on the Security Assertion Markup Language (SAML) standards becomes more and more important, there are quit...
Jan Eichholz, Detlef Hühnlein, Jörg Schw...