Sciweavers

13224 search results - page 2399 / 2645
» Self-monitoring for Computer Users
Sort
View
ASIACRYPT
2001
Springer
14 years 2 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
CIKM
2001
Springer
14 years 2 months ago
Content-Based Retrieval of MP3 Music Objects
In recent years, the searching and indexing techniques for multimedia data are getting more attention in the area of multimedia databases. As many research works were done on the ...
Chih-Chin Liu, Po-Jun Tsai
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
14 years 2 months ago
Image Mining: Issues, Frameworks and Techniques
Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal usefu...
Ji Zhang, Wynne Hsu, Mong-Li Lee
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
14 years 2 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
SSD
2001
Springer
103views Database» more  SSD 2001»
14 years 2 months ago
Similarity of Cardinal Directions
Like people who casually assess similarity between spatial scenes in their routine activities, users of pictorial databases are often interested in retrieving scenes that are simil...
Roop K. Goyal, Max J. Egenhofer
« Prev « First page 2399 / 2645 Last » Next »