Sciweavers

1897 search results - page 50 / 380
» Early application identification
Sort
View
PKC
2000
Springer
118views Cryptology» more  PKC 2000»
15 years 3 months ago
An Identification Scheme Based on Sparse Polynomials
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
William D. Banks, Daniel Lieman, Igor Shparlinski
ICDE
2006
IEEE
194views Database» more  ICDE 2006»
16 years 1 months ago
The Gauss-Tree: Efficient Object Identification in Databases of Probabilistic Feature Vectors
In applications of biometric databases the typical task is to identify individuals according to features which are not exactly known. Reasons for this inexactness are varying meas...
Alexey Pryakhin, Christian Böhm, Matthias Sch...
WISEC
2010
ACM
15 years 1 days ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ESANN
2004
15 years 1 months ago
Dynamic functional-link neural networks genetically evolved applied to system identification
: The contribution concerns the design of a generalised functional-link neural network with internal dynamics and its applicability to system identification by means of multi-input...
Teodor Marcu, Birgit Köppen-Seliger
APPML
2008
77views more  APPML 2008»
14 years 12 months ago
A controllability approach to shape identification
The main goal of this article is to discuss a controllability approach to the image matching / shape identification problem, an important issue in many applications, medical ones ...
Robert Azencott, Roland Glowinski, A. M. Ramos