Sciweavers

4795 search results - page 910 / 959
» The Message Classification Model
Sort
View
BIOID
2008
149views Biometrics» more  BIOID 2008»
13 years 12 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
IWCMC
2010
ACM
13 years 12 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
ATVA
2006
Springer
109views Hardware» more  ATVA 2006»
13 years 12 months ago
Proactive Leader Election in Asynchronous Shared Memory Systems
Abstract. In this paper, we give an algorithm for fault-tolerant proactive leader election in asynchronous shared memory systems, and later its formal verification. Roughly speakin...
M. C. Dharmadeep, K. Gopinath
ICALP
2010
Springer
13 years 12 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
DAGSTUHL
2007
13 years 11 months ago
Signalling Preferences in Interviewing Markets
The process of match formation in matching markets can be divided into three parts: information sharing, investments in information acquisition, and the formation of matches based...
Robin S. Lee, Michael A. Schwarz