Sciweavers

1610 search results - page 144 / 322
» Identity Based Multisignatures
Sort
View
DATE
2005
IEEE
122views Hardware» more  DATE 2005»
15 years 8 months ago
Diagnostic and Detection Fault Collapsing for Multiple Output Circuits
We discuss fault equivalence and dominance relations for multiple output combinational circuits. The conventional definition for equivalence says that “Two faults are equivalen...
Raja K. K. R. Sandireddy, Vishwani D. Agrawal
EUROCRYPT
2010
Springer
15 years 8 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
ICIP
2008
IEEE
16 years 5 months ago
Omnidirectional tracking and recognition of persons in planar views
In this paper a view-independent head tracking system applying an Active Shape Model based particle filter is used to find precise image sections. DCTmod2 feature sequences are ex...
Andre Störmer, Gerhard Rigoll, Sascha Schreib...
ISMIS
2009
Springer
15 years 9 months ago
Novelty Detection from Evolving Complex Data Streams with Time Windows
Abstract. Novelty detection in data stream mining denotes the identification of new or unknown situations in a stream of data elements flowing continuously in at rapid rate. This...
Michelangelo Ceci, Annalisa Appice, Corrado Loglis...
116
Voted
ICPR
2008
IEEE
15 years 9 months ago
Determination of optimal metabolic pathways through a new learning algorithm
In the present article, we introduce a new method for identification of metabolic pathways in constraint based models that consider enzyme and substrate concentrations. It genera...
C. A. Murthy, Mouli Das, Rajat K. De, Subhasis Muk...