Sciweavers

4263 search results - page 818 / 853
» Learning without Coding
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 8 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
15 years 8 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
ICB
2009
Springer
167views Biometrics» more  ICB 2009»
15 years 8 months ago
Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge
The latest multi-biometric grand challenge (MBGC 2008) sets up a new experiment in which near infrared (NIR) face videos containing partial faces are used as a probe set and the vi...
Dong Yi, ShengCai Liao, Zhen Lei, Jitao Sang, Stan...
MHCI
2009
Springer
15 years 8 months ago
Tacticycle: a tactile display for supporting tourists on a bicycle trip
Cycling is a common leisure time sports in touristic regions. For us it was the question how tourists actually find their paths in the area and what kind of navigation aids might...
Benjamin Poppinga, Martin Pielot, Susanne Boll
MM
2009
ACM
178views Multimedia» more  MM 2009»
15 years 8 months ago
Semantic context transfer across heterogeneous sources for domain adaptive video search
Automatic video search based on semantic concept detectors has recently received significant attention. Since the number of available detectors is much smaller than the size of h...
Yu-Gang Jiang, Chong-Wah Ngo, Shih-Fu Chang