Sciweavers

1471 search results - page 17 / 295
» Adaptive Discriminative Generative Model and Its Application...
Sort
View
ASIACRYPT
2005
Springer
15 years 7 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
CVPR
2000
IEEE
16 years 3 months ago
Discriminant-EM Algorithm with Application to Image Retrieval
In Proc. of IEEE Conf. on CVPR'2000, Vol.I, pp.222-227, Hilton Head Island, SC, 2000 In many vision applications, the practice of supervised learning faces several difficulti...
Ying Wu, Qi Tian, Thomas S. Huang
ICASSP
2011
IEEE
14 years 5 months ago
Whole word discriminative point process models
This paper introduces a discriminative extension to whole-word point process modeling techniques. Meant to circumvent the strong independence assumptions of their generative prede...
Aren Jansen
ICML
2007
IEEE
16 years 2 months ago
Local similarity discriminant analysis
We propose a local, generative model for similarity-based classification. The method is applicable to the case that only pairwise similarities between samples are available. The c...
Luca Cazzanti, Maya R. Gupta
IACR
2011
107views more  IACR 2011»
14 years 1 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...