Sciweavers

6137 search results - page 153 / 1228
» Securing Collaborative Applications
Sort
View
ISMIR
2005
Springer
206views Music» more  ISMIR 2005»
14 years 2 months ago
Improving Content-Based Similarity Measures by Training a Collaborative Model
We observed that for multimedia data – especially music - collaborative similarity measures perform much better than similarity measures derived from content-based sound feature...
Richard Stenzel, Thomas Kamps
IPM
2010
106views more  IPM 2010»
13 years 7 months ago
An asynchronous collaborative search system for online video search
There are a number of multimedia tasks and environments that can be collaborative in nature and involve contributions from more than one individual. Examples of such tasks include...
Martin Halvey, David Vallet, David Hannah, Yue Fen...
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 2 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
ACSAC
1999
IEEE
14 years 1 months ago
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services
Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based tr...
Marco Prandini
MR
2010
219views Robotics» more  MR 2010»
13 years 3 months ago
Applications of TEM imaging, analysis and electron holography to III-nitride HEMT devices
David J. Smith, David A. Cullen, Lin Zhou, Martha ...