Sciweavers

121 search results - page 2 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
PDP
2010
IEEE
13 years 10 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen
NIPS
2004
13 years 6 months ago
Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)
Machine learning is often used to automatically solve human tasks. In this paper, we look for tasks where machine learning algorithms are not as good as humans with the hope of ga...
Kumar Chellapilla, Patrice Y. Simard
ICMCS
2006
IEEE
164views Multimedia» more  ICMCS 2006»
13 years 10 months ago
Video Break Detection based on Similarity Analysis and Temporal Statistical Characteristics
Video Shot boundary detection is a fundamental task in any kind of video content manipulation and retrieval. The area of shot boundary detection has been extensively studied, but ...
Jianjun Huang
IVA
2009
Springer
13 years 11 months ago
Teaching Computers to Conduct Spoken Interviews: Breaking the Realtime Barrier with Learning
Abstract. Several challenges remain in the effort to build software capable of conducting realtime dialogue with people. Part of the problem has been a lack of realtime flexibili...
Gudny Ragna Jonsdottir, Kristinn R. Thóriss...
FCS
2006
13 years 6 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu