Sciweavers

1744 search results - page 302 / 349
» The Steganographic File System
Sort
View
131
Voted
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 5 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
141
Voted
CVHI
2007
15 years 5 months ago
Haptic and Aural Graphs Exploration for Visually Impaired Users
: Several web sites and e-learning platforms require the access to graphs that carry significant meanings. Understanding and perceiving the graph of a mathematical function is impo...
Thimoty Barbieri, Lorenzo Mosca, Licia Sbattella
131
Voted
SERVICES
2010
119views more  SERVICES 2010»
15 years 5 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
116
Voted
GEOINFO
2007
15 years 5 months ago
Desenvolvimento de SIG para Web utilizando MDA
This work aims at increasing the development productivity of the Geographic Information Systems through the MDA. We defined an UML extension which adds geographic information to th...
Carlos Eduardo R. de Mello, Geraldo Zimbrão...
130
Voted
LREC
2008
98views Education» more  LREC 2008»
15 years 5 months ago
Producing a Test Collection for Patent Machine Translation in the Seventh NTCIR Workshop
In aiming at research and development on machine translation, we produced a test collection for Japanese-English machine translation in the seventh NTCIR Workshop. This paper desc...
Atsushi Fujii, Masao Utiyama, Mikio Yamamoto, Take...