Sciweavers

CICLING
2009
Springer
15 years 9 months ago
Language Identification on the Web: Extending the Dictionary Method
Abstract. Automated language identification of written text is a wellestablished research domain that has received considerable attention in the past. By now, efficient and effecti...
Radim Rehurek, Milan Kolkus
102
Voted
TRUST
2010
Springer
15 years 9 months ago
Software on the Witness Stand: What Should It Take for Us to Trust It?
Sergey Bratus, Ashlyn Lembree, Anna Shubina
143
Voted
CVPR
2007
IEEE
15 years 9 months ago
Active Aperture Control and Sensor Modulation for Flexible Imaging
In the paper, we describe an optical system which is capable of providing external access to both the sensor and the lens aperture (i.e., projection center) of a conventional came...
Chunyu Gao, Narendra Ahuja, Hong Hua
146
Voted
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
15 years 9 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
123
Voted
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 9 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...