Sciweavers

1282 search results - page 181 / 257
» Signing on signing off
Sort
View
EUROGP
2009
Springer
149views Optimization» more  EUROGP 2009»
15 years 7 months ago
Adaptation, Performance and Vapnik-Chervonenkis Dimension of Straight Line Programs
Abstract. We discuss here empirical comparation between model selection methods based on Linear Genetic Programming. Two statistical methods are compared: model selection based on ...
José Luis Montaña, César Luis...
90
Voted
FC
2009
Springer
100views Cryptology» more  FC 2009»
15 years 7 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
91
Voted
FC
2009
Springer
99views Cryptology» more  FC 2009»
15 years 7 months ago
Optical DNA
Abstract. A certificate of authenticity (COA) is an inexpensive physical object with a random and unique structure S which is hard to nearexactly replicate. An inexpensive device ...
Deepak Vijaywargi, Dave Lewis, Darko Kirovski
94
Voted
MOBISEC
2009
Springer
15 years 7 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...
129
Voted
SCIA
2009
Springer
161views Image Analysis» more  SCIA 2009»
15 years 7 months ago
A Fast Optimization Method for Level Set Segmentation
Abstract. Level set methods are a popular way to solve the image segmentation problem in computer image analysis. A contour is implicitly represented by the zero level of a signed ...
Thord Andersson, Gunnar Läthén, Reiner...