Sciweavers

252 search results - page 49 / 51
» On Robust Key Agreement Based on Public Key Authentication
Sort
View
113
Voted
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 5 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
ICPR
2010
IEEE
15 years 5 months ago
The Fusion of Deep Learning Architectures and Particle Filtering Applied to Lip Tracking
This work introduces a new pattern recognition model for segmenting and tracking lip contours in video sequences. We formulate the problem as a general nonrigid object tracking me...
Gustavo Carneiro, Jacinto Nascimento
118
Voted
BMVC
2010
14 years 11 months ago
Discriminative Topics Modelling for Action Feature Selection and Recognition
This paper presents a framework for recognising realistic human actions captured from unconstrained environments. The novelties of this work lie in three aspects. First, we propos...
Matteo Bregonzio, Jian Li, Shaogang Gong, Tao Xian...
132
Voted
COST
2009
Springer
178views Multimedia» more  COST 2009»
15 years 5 months ago
Fusion of Movement Specific Human Identification Experts
Abstract. In this paper a multi-modal method for human identification that exploits the discriminant features derived from several movement types performed from the same human is p...
Nikolaos Gkalelis, Anastasios Tefas, Ioannis Pitas
146
Voted
IMC
2009
ACM
15 years 8 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...