Sciweavers

1358 search results - page 166 / 272
» Proceedings
Sort
View
TRUSTBUS
2010
Springer
15 years 2 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
VC
2010
160views more  VC 2010»
15 years 2 months ago
A lightweight approach to repairing digitized polygon meshes
Abstract When designing novel algorithms for geometric processing and analysis, researchers often assume that the input conforms to several requirements. On the other hand, polygon...
Marco Attene
ASIACRYPT
2010
Springer
15 years 2 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
BMVC
2010
15 years 2 months ago
Live Feature Clustering in Video Using Appearance and 3D Geometry
We present a method for live grouping of feature points into persistent 3D clusters as a single camera browses a static scene, with no additional assumptions, training or infrastr...
Adrien Angeli, Andrew Davison
CEC
2010
IEEE
15 years 2 months ago
EDDIE for investment opportunities forecasting: Extending the search space of the GP
Abstract-- In this paper we present a new version of a GPbased financial forecasting tool called EDDIE. The novelty of this new version (EDDIE 8), is its enlarged search space, whe...
Michael Kampouridis, Edward Tsang