Sciweavers

111 search results - page 21 / 23
» New Public Key Cryptosystems Based on the Dependent-RSA Prob...
Sort
View
DSN
2007
IEEE
15 years 6 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
SRDS
2003
IEEE
15 years 4 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
98
Voted
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 4 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ICPR
2010
IEEE
15 years 2 months ago
The Fusion of Deep Learning Architectures and Particle Filtering Applied to Lip Tracking
This work introduces a new pattern recognition model for segmenting and tracking lip contours in video sequences. We formulate the problem as a general nonrigid object tracking me...
Gustavo Carneiro, Jacinto Nascimento
JCB
2007
146views more  JCB 2007»
14 years 11 months ago
MSOAR: A High-Throughput Ortholog Assignment System Based on Genome Rearrangement
The assignment of orthologous genes between a pair of genomes is a fundamental and challenging problem in comparative genomics, since many computational methods for solving variou...
Zheng Fu, Xin Chen, Vladimir Vacic, Peng Nan, Yang...