Sciweavers

1610 search results - page 77 / 322
» Identity Based Multisignatures
Sort
View
ACL
2001
15 years 3 months ago
Information Extraction from Voicemail
In this paper we address the problem of extracting key pieces of information from voicemail messages, such as the identity and phone number of the caller. This task differs from t...
Jing Huang, Geoffrey Zweig, Mukund Padmanabhan
ECTEL
2007
Springer
15 years 8 months ago
Network Analysis of Repositories
In the paper an approach to analysis of the structure of repositories based on network analysis is proposed. The repository metadata can be transformed into several (one-mode or tw...
Vladimir Batagelj, Iztok Kavkler, Matija Lokar
DIM
2008
ACM
15 years 3 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 7 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
ICIP
2005
IEEE
16 years 3 months ago
Tensor-based factor decomposition for relighting
Lighting condition is an important factor in face analysis and synthesis, which has received extensive study in both computer vision and computer graphics. Motivated by the work on...
Dahua Lin, Yingqing Xu, Xiaoou Tang, Shuicheng Yan