Sciweavers

45 search results - page 3 / 9
» Functional Signcryption: Notion, Construction, and Applicati...
Sort
View
ICIP
2008
IEEE
14 years 1 days ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
ACMDIS
2006
ACM
13 years 11 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
ML
2007
ACM
144views Machine Learning» more  ML 2007»
13 years 5 months ago
Invariant kernel functions for pattern analysis and machine learning
In many learning problems prior knowledge about pattern variations can be formalized and beneficially incorporated into the analysis system. The corresponding notion of invarianc...
Bernard Haasdonk, Hans Burkhardt
LREC
2008
131views Education» more  LREC 2008»
13 years 7 months ago
Using Semantically Annotated Corpora to Build Collocation Resources
We present an experiment in extracting collocations from the FrameNet corpus, specifically, support verbs such as direct in Environmentalists directed strong criticism at world le...
Margarita Alonso Ramos, Owen Rambow, Leo Wanner
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
13 years 11 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka