Sciweavers

24188 search results - page 247 / 4838
» Computing on Encrypted Data
Sort
View
KDD
2009
ACM
158views Data Mining» more  KDD 2009»
15 years 10 months ago
KissKissBan: a competitive human computation game for image annotation
Chien-Ju Ho, Tao-Hsuan Chang, Jong-Chuan Lee, Jane...
135
Voted
CMS
2003
148views Communications» more  CMS 2003»
15 years 5 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
141
Voted
NIXDORF
1992
127views Hardware» more  NIXDORF 1992»
15 years 7 months ago
Three non Conventional Paradigms of Parallel Computation
Abstract. We consider three paradigms of computation where the bene ts of a parallel solution are greater than usual. Paradigm 1 works on a time-varying input data set, whose size ...
Fabrizio Luccio, Linda Pagli, Geppino Pucci
106
Voted
GECCO
2000
Springer
15 years 7 months ago
Genetic Programming within a Framework of Computer-Aided Discovery of Scientific Knowledge
Present day instrumentation networks already provide immense quantities of data, very little of which provides any insights into the basic physical phenomena that are occurring in...
Maarten Keijzer, Vladan Babovic
JDFP
2006
139views more  JDFP 2006»
15 years 3 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer