Sciweavers

20175 search results - page 145 / 4035
» Is abstraction the key to computing
Sort
View
107
Voted
NDSS
1999
IEEE
15 years 5 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
ICIP
1998
IEEE
16 years 2 months ago
Adaptive Key Frame Extraction using Unsupervised Clustering
Key frame extraction has been recognized as one of the important research issues in video information retrieval. Although progress has been made in key frame extraction, the exist...
Yueting Zhuang, Yong Rui, Thomas S. Huang, Sharad ...
104
Voted
ACL
2009
14 years 10 months ago
An Ontology-Based Approach for Key Phrase Extraction
Automatic key phrase extraction is fundamental to the success of many recent digital library applications and semantic information retrieval techniques and a difficult and essenti...
Chau Q. Nguyen, Tuoi T. Phan
98
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
Practical Large-Scale Distributed Key Generation
Generating a distributed key, where a constant fraction of the players can reconstruct the key, is an essential component of many largescale distributed computing tasks such as ful...
John F. Canny, Stephen Sorkin
88
Voted
ICPR
2010
IEEE
15 years 2 months ago
Recognizing Human Actions Using Key Poses
In this paper, we explore the idea of using only pose, without utilizing any temporal information, for human action recognition. In contrast to the other studies using complex acti...
Sermetcan Baysal, Mehmet Can Kurt, Pinar Duygulu