Sciweavers

27692 search results - page 97 / 5539
» Where is ...
Sort
View
CCS
2008
ACM
13 years 11 months ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor
CEC
2008
IEEE
13 years 11 months ago
Learning defect classifiers for visual inspection images by neuro-evolution using weakly labelled training data
This article presents results from experiments where a detector for defects in visual inspection images was learned from scratch by EANT2, a method for evolutionary reinforcement l...
Nils T. Siebel, Gerald Sommer
ESANN
2008
13 years 10 months ago
Factored sequence kernels
In this paper we propose an extension of sequence kernels to the case where the symbols that define the sequences have multiple representations. This configuration occurs in natura...
Pierre Mahé, Nicola Cancedda
SERVICES
2008
109views more  SERVICES 2008»
13 years 10 months ago
Specifying Flexible Charging Rules for Composable Services
Where services are offered on a commercial basis, the manner in which charges for service usage are calculated is of key importance. Services typically have associated with them a...
Brendan Jennings, Lei Xu, Eamonn de Leastar
AIM
2006
13 years 10 months ago
Analysis of collaborative tools usages in heterogeneous contexts
: Situations of collaborative working are more and more complex and various in organizations. Such diversification is little studied in the literature. Researches about "techn...
Ali Ouni, Jean-Claude Bocquet, Daniele Bonnivard