Sciweavers

14 search results - page 3 / 3
» Transformation from Identity Stone Age to Digital Identity
Sort
View
EUROCRYPT
2003
Springer
13 years 10 months ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
SAC
2006
ACM
13 years 5 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
ADC
2007
Springer
170views Database» more  ADC 2007»
13 years 11 months ago
Pruning SIFT for Scalable Near-duplicate Image Matching
The detection of image versions from large image collections is a formidable task as two images are rarely identical. Geometric variations such as cropping, rotation, and slight p...
Jun Jie Foo, Ranjan Sinha
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
14 years 5 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong