Sciweavers

267 search results - page 38 / 54
» Online Auctions: There Can Be Only One
Sort
View
CN
2007
144views more  CN 2007»
14 years 11 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 1 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
ICCV
2005
IEEE
16 years 1 months ago
Integration of Conditionally Dependent Object Features for Robust Figure/Background Segmentation
We propose a new technique for fusing multiple cues to robustly segment an object from its background in video sequences that suffer from abrupt changes of both illumination and p...
Francesc Moreno-Noguer, Alberto Sanfeliu, Dimitris...
CHI
2006
ACM
16 years 4 days ago
Urbanhermes: social signaling with electronic fashion
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Christine M. Liu, Judith S. Donath
ACCV
2007
Springer
15 years 6 months ago
Coarse-to-Fine Statistical Shape Model by Bayesian Inference
In this paper, we take a predefined geometry shape as a constraint for accurate shape alignment. A shape model is divided in two parts: fixed shape and active shape. The fixed shap...
Ran He, Stan Z. Li, Zhen Lei, ShengCai Liao