Sciweavers

5475 search results - page 1059 / 1095
» Model Driven Security
Sort
View
128
Voted
CVPR
2007
IEEE
16 years 2 months ago
Using Group Prior to Identify People in Consumer Images
While face recognition techniques have rapidly advanced in the last few years, most of the work is in the domain of security applications. For consumer imaging applications, perso...
Andrew C. Gallagher, Tsuhan Chen
CVPR
2008
IEEE
16 years 2 months ago
Estimating age, gender, and identity using first name priors
Recognizing people in images is one of the foremost challenges in computer vision. It is important to remember that consumer photography has a highly social aspect. The photograph...
Andrew C. Gallagher, Tsuhan Chen
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 7 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
IJNSEC
2010
247views more  IJNSEC 2010»
14 years 7 months ago
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and imp...
Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail
112
Voted
JAMIA
2010
131views more  JAMIA 2010»
14 years 7 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
« Prev « First page 1059 / 1095 Last » Next »