Sciweavers

ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 8 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
ACMIDC
2010
15 years 8 months ago
Digital inclusion in Chilean in rural schools
This paper analyzes conditions for improving digital inclusion in Chilean rural schools, using a multidimensional definition of digital divide. Using qualitative and quantitative ...
Jaime Sánchez
CVPR
2010
IEEE
15 years 8 months ago
Integrated Pedestrian Classification and Orientation Estimation
This paper presents a novel approach to single-frame pedestrian classification and orientation estimation. Unlike previous work which addressed classification and orientation sepa...
Markus Enzweiler, Dariu Gavrila
CVPR
2010
IEEE
15 years 8 months ago
Harvesting Large-Scale Weakly-Tagged Image Databases from the Web
To leverage large-scale weakly-tagged images for computer vision tasks (such as object detection and scene recognition), a novel cross-modal tag cleansing and junk image filtering...
Jianping Fan

Publication
78views
15 years 8 months ago
Chloroplast microsatellites: measures of genetic diversity and the effect of homoplasy
Chloroplast microsatellites have been widely used in population genetic studies of conifers in recent years. However, their haplotype configurations suggest that they could have hi...
Navascués, M. & Emerson, B. C.