Sciweavers

1166 search results - page 73 / 234
» Adaptively Secure Broadcast
Sort
View
107
Voted
TC
2010
14 years 11 months ago
Authenticated Group Key Transfer Protocol Based on Secret Sharing
—Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most ofte...
Lein Harn, Changlu Lin
101
Voted
TCC
2010
Springer
169views Cryptology» more  TCC 2010»
15 years 9 months ago
On Complete Primitives for Fairness
Abstract. For secure two-party and multi-party computation with abort, classification of which primitives are complete has been extensively studied in the literature. However, for...
S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostr...
CVPR
2009
IEEE
16 years 6 months ago
Learning Signs from Subtitles: A Weakly Supervised Approach to Sign Language Recognition
This paper introduces a fully-automated, unsupervised method to recognise sign from subtitles. It does this by using data mining to align correspondences in sections of videos. Bas...
Helen Cooper, Richard Bowden
79
Voted
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Enhance speaker segmentation by elaborating utterance detection
In this paper, we introduce an elaborate utterance detection algorithm to enhance speaker segmentation. Silence detector, further divider and audio type classifier are employed i...
Min Yang, Zhaohui Wu, Yingchun Yang
112
Voted
JUCS
2008
130views more  JUCS 2008»
15 years 16 days ago
Compensation Models for Interactive Advertising
: Due to a shift in the marketing focus from mass to micro markets, the importance of one-to-one communication in advertising has increased. Interactive media provide possible answ...
Astrid Dickinger, Steffen Zorn