Sciweavers

708 search results - page 69 / 142
» Observing the Materiality of Values in Information Systems R...
Sort
View
83
Voted
ISN
1998
Springer
15 years 4 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
81
Voted
IMAGING
2001
15 years 2 months ago
Real-time Multi-Spectral Image Processing for Mapping Pigmentation in Human Skin
Real-time mapping pigmentation in human skin is expected to give useful information for reproducing various skin colors and monitoring human conditions in real time. In this resea...
Daisuke Nakao, Norimichi Tsumura, Yoichi Miyake
SEMWEB
2007
Springer
15 years 6 months ago
Vocabulary Patterns in Free-for-all Collaborative Indexing Systems
In collaborative indexing systems users generate a big amount of metadata by labelling web-based content. These labels are known as tags and form a shared vocabulary. In order to u...
Wolfgang Maass, Tobias Kowatsch, Timo Münster
CVPR
2004
IEEE
16 years 2 months ago
3D Facial Tracking from Corrupted Movie Sequences
In this paper we perform 3D face tracking on corrupted video sequences. We use a deformable model, combined with a predictive filter, to recover both the rigid transformations and...
Siome Goldenstein, Christian Vogler, Dimitris N. M...
85
Voted
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
15 years 6 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart