Sciweavers

679 search results - page 110 / 136
» Using decision problems in public key cryptography
Sort
View
CVPR
2009
IEEE
16 years 8 months ago
Pedestrian Detection: A Benchmark
Pedestrian detection is a key problem in computer vision, with several applications including robotics, surveillance and automotive safety. Much of the progress of the past few ...
Bernt Schiele, Christian Wojek, Pietro Perona, Pio...
EDBT
2004
ACM
108views Database» more  EDBT 2004»
16 years 1 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
HICSS
2006
IEEE
101views Biometrics» more  HICSS 2006»
15 years 7 months ago
IT Projects: Conflict, Governance, and Systems Thinking
Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good govern...
David Johnstone, Sid L. Huff, Beverley G. Hope
EUROCRYPT
2007
Springer
15 years 5 months ago
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Abstract. We introduce a notion of instance-dependent verifiable random functions (InstD-VRFs for short). Informally, an InstD-VRF is, in some sense, a verifiable random function [...
Yi Deng, Dongdai Lin
JDCTA
2008
83views more  JDCTA 2008»
15 years 1 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong