Sciweavers

455 search results - page 65 / 91
» Differential Privacy in New Settings
Sort
View
CSFW
2002
IEEE
15 years 2 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
77
Voted
DATE
2004
IEEE
102views Hardware» more  DATE 2004»
15 years 1 months ago
High Security Smartcards
New consumer appliances such as PDA, Set Top Box, GSM/UMTS terminals enable an easy access to the internet and strongly contribute to the development of ecommerce and m-commerce s...
Marc Renaudin, G. Fraidy Bouesse, Ph. Proust, J. P...
AAAI
2000
14 years 11 months ago
Asynchronous Search with Aggregations
Many problem-solving tasks can be formalized as constraint satisfaction problems (CSPs). In a multi-agent setting, information about constraints and variables may belong to differ...
Marius-Calin Silaghi, Djamila Sam-Haroud, Boi Falt...
ECCV
2008
Springer
15 years 11 months ago
Partial Difference Equations over Graphs: Morphological Processing of Arbitrary Discrete Data
Abstract. Mathematical Morphology (MM) offers a wide range of operators to address various image processing problems. These processing can be defined in terms of algebraic set or a...
Vinh-Thong Ta, Abderrahim Elmoataz, Olivier Lezora...
ISBI
2004
IEEE
15 years 10 months ago
Search Space Partitioning Using Convex Hull and Concavity Features for Fast Medical Image Retrieval
A new approach is presented for partitioning an image database by classifying and indexing the convex hull shapes and the number of region concavities. The result is a significant...
Phillip Mlsna, Nikolay Sirakov