Sciweavers

7335 search results - page 1341 / 1467
» Scene Based Reasoning
Sort
View
126
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
ICB
2009
Springer
167views Biometrics» more  ICB 2009»
15 years 10 months ago
Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge
The latest multi-biometric grand challenge (MBGC 2008) sets up a new experiment in which near infrared (NIR) face videos containing partial faces are used as a probe set and the vi...
Dong Yi, ShengCai Liao, Zhen Lei, Jitao Sang, Stan...
MDM
2009
Springer
269views Communications» more  MDM 2009»
15 years 10 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
119
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Processing OWL2 Ontologies using Thea: An Application of Logic Programming
Traditional object-oriented programming languages can be difficult to use when working with ontologies, leading to the creation of domain-specific languages designed specifically...
Vangelis Vassiliadis, Jan Wielemaker, Chris Mungal...
134
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 1341 / 1467 Last » Next »