Sciweavers

411 search results - page 39 / 83
» Extracting Temporal Information from Short Messages
Sort
View
IACR
2011
134views more  IACR 2011»
13 years 9 months ago
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases
Zero knowledge sets (ZKS) [18] allow a party to commit to a secret set S and then to, non interactively, produce proofs for statements such as x ∈ S or x /∈ S. As recognized in...
Dario Catalano, Dario Fiore
CIKM
2009
Springer
15 years 4 months ago
Event detection from flickr data through wavelet-based spatial analysis
Detecting events from web resources has attracted increasing research interests in recent years. Our focus in this paper is to detect events from photos on Flickr, an Internet ima...
Ling Chen, Abhishek Roy
BCSHCI
2007
14 years 11 months ago
Identifying web usability problems from eye-tracking data
Eye-tracking research is increasingly used to supplement usability tests in both commercial and academic practice. However, while there has been research into links between eyetra...
Claudia Ehmke, Stephanie Wilson
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 3 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
CVPR
2012
IEEE
13 years 5 days ago
Depth from optical turbulence
Turbulence near hot surfaces such as desert terrains and roads during the summer, causes shimmering, distortion and blurring in images. While recent works have focused on image re...
Yuandong Tian, Srinivasa G. Narasimhan, Alan J. Va...