Sciweavers

6574 search results - page 79 / 1315
» Current Signatures: Application
Sort
View
JUCS
2006
126views more  JUCS 2006»
15 years 20 days ago
Behavioral Institutions and Refinements in Generalized Hidden Logics
: We investigate behavioral institutions and refinements in the context of the object oriented paradigm. The novelty of our approach is the application of generalized abstract alge...
Manuel A. Martins
96
Voted
MICCAI
2010
Springer
14 years 11 months ago
Automatic Detection of Anatomical Features on 3D Ear Impressions for Canonical Representation
Abstract. We propose a shape descriptor for 3D ear impressions, derived from a comprehensive set of anatomical features. Motivated by hearing aid (HA) manufacturing, the selection ...
Sajjad Baloch, Rupen Melkisetoglu, Simon Flör...
ASIACRYPT
2009
Springer
15 years 7 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
98
Voted
CIKM
2009
Springer
15 years 7 months ago
Automatic retrieval of similar content using search engine query interface
We consider the coverage testing problem where we are given a document and a corpus with a limited query interface and asked to find if the corpus contains a near-duplicate of th...
Ali Dasdan, Paolo D'Alberto, Santanu Kolay, Chris ...
99
Voted
ISCC
2006
IEEE
15 years 6 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...