In this paper we describe a novel method for gait based identity verification based on Bayesian classification. The verification task is reduced to a two class problem (Client or ...
We study a system where many identical users of a service share a common resource. Each user is sensitive to congestion at the resource, but also experiences a positive network ef...
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
The classes of languages which are boolean combinations of languages of the form A a1A a2A . . . A a A , where a1, . . . , a A, k , for a fixed k 0, form a natural hierarchy wit...
We develop new techniques for time series classification based on hierarchical Bayesian generative models (called mixed-effect models) and the Fisher kernel derived from them. A k...