Sciweavers

787 search results - page 103 / 158
» Subversion-Resilient Signature Schemes
Sort
View
EDBT
2008
ACM
178views Database» more  EDBT 2008»
15 years 10 months ago
Compacting music signatures for efficient music retrieval
Music information retrieval is becoming very important with the ever-increasing growth of music content in digital libraries, peer-to-peer systems and the internet. While it is ea...
Bin Cui, H. V. Jagadish, Beng Chin Ooi, Kian-Lee T...
HPCA
2009
IEEE
15 years 10 months ago
Voltage emergency prediction: Using signatures to reduce operating margins
Inductive noise forces microprocessor designers to sacrifice performance in order to ensure correct and reliable operation of their designs. The possibility of wide fluctuations i...
Vijay Janapa Reddi, Meeta Sharma Gupta, Glenn H. H...
WACV
2012
IEEE
13 years 5 months ago
Predicting human gaze using quaternion DCT image signature saliency and face detection
We combine and extend the previous work on DCT-based image signatures and face detection to determine the visual saliency. To this end, we transfer the scalar definition of image...
Boris Schauerte, Rainer Stiefelhagen
MMM
2007
Springer
128views Multimedia» more  MMM 2007»
15 years 4 months ago
Video Histogram: A Novel Video Signature for Efficient Web Video Duplicate Detection
The explosive growth of information technology and digital content industry stimulates various video applications over the Internet. Since it is quite easy to copy, reformat, modif...
Lu Liu, Wei Lai, Xian-Sheng Hua, Shi-Qiang Yang
PPDP
2005
Springer
15 years 3 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...