Sciweavers

1834 search results - page 281 / 367
» Public Key Cryptography
Sort
View
AMFG
2007
IEEE
283views Biometrics» more  AMFG 2007»
13 years 12 months ago
Learning Personal Specific Facial Dynamics for Face Recognition from Videos
In this paper, we present an effective approach for spatiotemporal face recognition from videos using an Extended set of Volume LBP (Local Binary Pattern features) and a boosting s...
Abdenour Hadid, Matti Pietikäinen, Stan Z. Li
DSN
2009
IEEE
13 years 11 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
13 years 11 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
BCSHCI
2007
13 years 9 months ago
Encouraging witting participation and performance in digital live art
We describe a framework for characterizing people’s behavior with Digital Live Art. Our framework considers people’s wittingness, technical skill, and interpretive abilities i...
Jennifer G. Sheridan, Nick Bryan-Kinns, Alice Bayl...
AAAI
2006
13 years 9 months ago
Monitoring Food Safety by Detecting Patterns in Consumer Complaints
EPFC (Emerging Patterns in Food Complaints) is the analytical component of the Consumer Complaint Monitoring System, designed to help the food safety officials to efficiently and ...
Artur Dubrawski, Kimberly Elenberg, Andrew W. Moor...