Sciweavers

188 search results - page 8 / 38
» Practical Two-Party Computation Based on the Conditional Gat...
Sort
View
ICCV
2003
IEEE
16 years 1 months ago
Conditional Feature Sensitivity: A Unifying View on Active Recognition and Feature Selection
The objective of active recognition is to iteratively collect the next "best" measurements (e.g., camera angles or viewpoints), to maximally reduce ambiguities in recogn...
Xiang Sean Zhou, Dorin Comaniciu, Arun Krishnan
ICASSP
2011
IEEE
14 years 3 months ago
Machine and acoustical condition dependency analyses for fast acoustic likelihood calculation techniques
The acceleration of acoustic likelihood calculation has been an important research issue for developing practical speech recognition systems. And there are various specification ...
Atsunori Ogawa, Satoshi Takahashi, Atsushi Nakamur...
89
Voted
PERCOM
2007
ACM
15 years 11 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
SIGCSE
2008
ACM
132views Education» more  SIGCSE 2008»
14 years 11 months ago
A case study of retention practices at the University of Illinois at Urbana-Champaign
Computer science is seeing a decline in enrollment at all levels of education. One key strategy for reversing this decline is to improve methods of student retention. This paper, ...
Tanya L. Crenshaw, Erin W. Chambers, Heather Metca...
123
Voted
WISEC
2010
ACM
15 years 4 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt