Sciweavers

10156 search results - page 1983 / 2032
» Step by Step to Histories
Sort
View
JOC
2010
124views more  JOC 2010»
14 years 10 months ago
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
We present a new encryption scheme which is secure against adaptive chosenciphertext attack (or CCA2-secure) in the standard model (i.e. without the use of random oracle). Our sch...
Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Vict...
JUCS
2010
183views more  JUCS 2010»
14 years 10 months ago
User Context and Personalized Learning: a Federation of Contextualized Attention Metadata
: Nowadays, personalized education is a very hot topic in technology enhanced learning (TEL) research. To support students during their learning process, the first step consists in...
Valentin Butoianu, Philippe Vidal, Katrien Verbert...
LREC
2010
175views Education» more  LREC 2010»
14 years 10 months ago
Creating a Reusable English-Chinese Parallel Corpus for Bilingual Dictionary Construction
This paper first describes an experiment to construct an English-Chinese parallel corpus, then applying the Uplug word alignment tool on the corpus and finally produce and evaluat...
Hercules Dalianis, Hao-chun Xing, Xin Zhang
MEDIAFORENSICS
2010
14 years 10 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
MM
2010
ACM
150views Multimedia» more  MM 2010»
14 years 10 months ago
Photo2Trip: generating travel routes from geo-tagged photos for trip planning
Travel route planning is an important step for a tourist to prepare his/her trip. As a common scenario, a tourist usually asks the following questions when he/she is planning his/...
Xin Lu, Changhu Wang, Jiang-Ming Yang, Yanwei Pang...
« Prev « First page 1983 / 2032 Last » Next »