Sciweavers

20294 search results - page 3942 / 4059
» Algorithmic Information Theory
Sort
View
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 11 months ago
NUS-WIDE: a real-world web image database from National University of Singapore
This paper introduces a web image dataset created by NUS’s Lab for Media Search. The dataset includes: (1) 269,648 images and the associated tags from Flickr, with a total of 5,...
Tat-Seng Chua, Jinhui Tang, Richang Hong, Haojie L...
COSIT
2009
Springer
106views GIS» more  COSIT 2009»
15 years 11 months ago
The Role of Angularity in Route Choice
Abstract. The paths of 2425 individual motorcycle trips made in London were analyzed in order to uncover the route choice decisions made by drivers. The paths were derived from glo...
Alasdair Turner
CPAIOR
2009
Springer
15 years 11 months ago
Optimal Interdiction of Unreactive Markovian Evaders
The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdi...
Alexander Gutfraind, Aric A. Hagberg, Feng Pan
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
15 years 11 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
« Prev « First page 3942 / 4059 Last » Next »