Sciweavers

1834 search results - page 352 / 367
» Public Key Cryptography
Sort
View
CCS
2008
ACM
13 years 9 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
ETVC
2008
13 years 9 months ago
Sparse Multiscale Patches for Image Processing
Abstract. This paper presents a framework to define an objective measure of the similarity (or dissimilarity) between two images for image processing. The problem is twofold: 1) de...
Paolo Piro, Sandrine Anthoine, Eric Debreuve, Mich...
ZEUS
2010
153views Communications» more  ZEUS 2010»
13 years 9 months ago
Estimating costs of a service
When designing a publicly available Web service, a service designer has to take care of costs and revenue caused by this services. In the very beginning possible partners might onl...
Christian Gierds, Jan Sürmeli
TRECVID
2008
13 years 9 months ago
Learning TRECVID'08 High-Level Features from YouTube
Run No. Run ID Run Description infMAP (%) training on TV08 data 1 IUPR-TV-M SIFT visual words with maximum entropy 6.1 2 IUPR-TV-MF SIFT with maximum entropy, fused with color+tex...
Adrian Ulges, Christian Schulze, Markus Koch, Thom...
SIMVIS
2007
13 years 9 months ago
Development of a Mixed Reality Device for Interactive On-Site Geo-visualization
This paper reports on the development of a novel mixed reality I/O device tailored to the requirements of interaction with geo-spatial data in the immediate environment of the use...
Volker Paelke, Claus Brenner