Sciweavers

507 search results - page 50 / 102
» The XTR Public Key System
Sort
View
MM
2010
ACM
170views Multimedia» more  MM 2010»
15 years 1 months ago
Training data collection system for a learning-based photographic aesthetic quality inference engine
We present a novel data collection system deployed for the ACQUINE - Aesthetic Quality Inference Engine. The goal of the system is to collect online user opinions, both structured...
Razvan Orendovici, James Ze Wang
122
Voted
DASC
2006
IEEE
15 years 6 months ago
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems
Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...
113
Voted
ESAS
2007
Springer
15 years 7 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
IPM
2002
86views more  IPM 2002»
15 years 15 days ago
Traditional IR for web users: a context for general audience digital libraries
The emergence of general audience digital libraries (GADLs) defines a context that represents a hybrid of both ``traditional'' IR, using primarily bibliographic resource...
Dietmar Wolfram, Hong (Iris) Xie
93
Voted
DGO
2003
118views Education» more  DGO 2003»
15 years 2 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel