Sciweavers

125 search results - page 6 / 25
» DBpedia Live Extraction
Sort
View
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
ECCV
2010
Springer
15 years 2 months ago
Face Liveness Detection from A Single Image with Sparse Low Rank Bilinear Discriminative Model
Spoofing with photograph or video is one of the most common manner to circumvent a face recognition system. In this paper, we present a real-time and non-intrusive method to addre...
93
Voted
JEI
2008
109views more  JEI 2008»
14 years 8 months ago
New approach for liveness detection in fingerprint scanners based on valley noise analysis
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Bozhao Tan, Stephanie A. C. Schuckers
89
Voted
MOBISYS
2009
ACM
15 years 10 months ago
A methodology for extracting temporal properties from sensor network data streams
The extraction of temporal characteristics from sensor data streams can reveal important properties about the sensed events. Knowledge of temporal characteristics in applications ...
Dimitrios Lymberopoulos, Athanasios Bamis, Andreas...
CLIN
2004
14 years 10 months ago
Off-line Answer Extraction for Dutch QA
In Jijkoun et al. [2004] we showed that off-line answer extraction using syntactic patterns is a successful method for answering English factoid questions. In this paper I will di...
Jori Mur