Sciweavers

42 search results - page 3 / 9
» Identity Boxing: A New Technique for Consistent Global Ident...
Sort
View
PUC
2008
120views more  PUC 2008»
13 years 4 months ago
Technology scruples: why intimidation will not save the recording industry and how enchantment might
While the recording industry continues to lobby for increasingly draconian laws to protect their interests, users of digital technology continue to share files and copy protected ...
Mark Blythe, Peter C. Wright
CCS
2005
ACM
13 years 11 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
CBMS
2006
IEEE
14 years 10 days ago
Telederm: Enhancing Dermatological Diagnosis for Rural and Remote Communities
This paper describes techniques used in a Web-based decision support system to enhance dermatological diagnosis for rural and remote communities. We proposed a technique to improv...
Monica H. Ou, Geoff A. W. West, Mihai Lazarescu, C...
CMS
2006
110views Communications» more  CMS 2006»
13 years 7 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
ICCBR
1997
Springer
13 years 10 months ago
Examining Locally Varying Weights for Nearest Neighbor Algorithms
Previous work on feature weighting for case-based learning algorithms has tended to use either global weights or weights that vary over extremely local regions of the case space. T...
Nicholas Howe, Claire Cardie