Sciweavers

374 search results - page 43 / 75
» Rights Protection for Relational Data
Sort
View
NDSS
2007
IEEE
14 years 2 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
GW
2007
Springer
85views Biometrics» more  GW 2007»
14 years 2 months ago
On the Parametrization of Clapping
Abstract. For a Reactive Virtual Trainer(RVT), subtle timing and lifelikeness of motion is of primary importance. To allow for reactivity, movement adaptation, like a change of tem...
Herwin van Welbergen, Zsófia Ruttkay
AUTOID
2005
IEEE
14 years 2 months ago
A Fast Algorithm for ICP-Based 3D Shape Biometrics
In a biometrics scenario, gallery images are enrolled into the database ahead of the matching step, which gives us the opportunity to build related data structures before the prob...
Ping Yan, Kevin W. Bowyer
GISCIENCE
2004
Springer
101views GIS» more  GISCIENCE 2004»
14 years 2 months ago
Modeling Surface Hydrology Concepts with Endurance and Perdurance
Abstract. Integration of GIS and hydrologic models has been a common approach for monitoring our ever-changing hydrologic system. One important issue in adapting such an approach i...
Chen-Chieh Feng, Thomas Bittner, Douglas M. Flewel...
ESANN
2007
13 years 10 months ago
Kernel-based online machine learning and support vector reduction
We apply kernel-based machine learning methods to online learning situations, and look at the related requirement of reducing the complexity of the learnt classifier. Online meth...
Sumeet Agarwal, V. Vijaya Saradhi, Harish Karnick