Sciweavers

122 search results - page 6 / 25
» The First Report on Scheme Revisited
Sort
View
PR
2006
95views more  PR 2006»
13 years 9 months ago
Classification of acoustic events using SVM-based clustering schemes
Acoustic events produced in controlled environments may carry information useful for perceptually aware interfaces. In this paper we focus on the problem of classifying 16 types o...
Andrey Temko, Climent Nadeu
ICIAR
2004
Springer
14 years 2 months ago
A Coarse-to-Fine Classification Scheme for Facial Expression Recognition
Abstract. In this paper, a coarse-to-fine classification scheme is used to recognize facial expressions (angry, disgust, fear, happiness, neutral, sadness and surprise) of novel ex...
Xiaoyi Feng, Abdenour Hadid, Matti Pietikäine...
CCS
2008
ACM
13 years 11 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
14 years 3 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
VLDB
2003
ACM
123views Database» more  VLDB 2003»
14 years 9 months ago
A case for fractured mirrors
The Decomposition Storage Model (DSM) vertically partitions all attributes of a given relation. DSM has excellent I/O behavior when the number of attributes touched in the query i...
Ravishankar Ramamurthy, David J. DeWitt, Qi Su