Filters








165,172 Hits in 2.4 sec

Secure Stable Matching at Scale

Jack Doerner, David Evans, abhi shelat
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
The resulting protocol is efficient enough to be useful at the scale required for matching medical residents nationwide, taking just over 18 hours to complete an execution simulating the 2016 national  ...  However, stable matching algorithms have previously been considered infeasible for execution in a secure multi-party context on non-trivial inputs because they are computationally intensive and involve  ...  Most of these are significantly smaller than the scale demonstrated by our simulated NRMP match, and we judge the cost of executing an NRMP-scale match as an MPC to be well within reasonable bounds for  ... 
doi:10.1145/2976749.2978373 dblp:conf/ccs/DoernerES16 fatcat:4wgv35kgwrhg5ob6ognyarchf4

Motion invariant palm-print texture based biometric security

Rohit Kumar, Ratnesh P. Keshri, C. Malathy, K. Annapoorani Panaiyappan
2010 Procedia Computer Science  
SIFT (Scale Invariant Feature Transformation) features have been used further for extracting stable texture features from the ROI and are stored.  ...  These stable features extracted from the ROI are further used for comparison with stable texture features extracted from ROI of other palmprint images to provide biometric based identification and security  ...  At each candidate location, a detailed model is fit to determine location, scale, and ratio of principal curvatures.  ... 
doi:10.1016/j.procs.2010.11.020 fatcat:am3o4tadljcbjh3sfmfuhld3zm

Bipartite Biotokens: Definition, Implementation, and Analysis [chapter]

W. J. Scheirer, T. E. Boult
2009 Lecture Notes in Computer Science  
Experimental results for matching accuracy are presented for the FVC 2002 data set and imposter testing on 750 Million matches.  ...  Cryptographic transactions form the basis of many common security systems found throughout computer networks.  ...  How the matching accuracy of fuzzy vaults scales to realistic amounts of data has yet to be shown.  ... 
doi:10.1007/978-3-642-01793-3_79 fatcat:3k5uuvprarbb7cs43wcm5gotke

Social Security Aided D2D Communications: Performance Bound and Implementation Mechanism

Xinlei Chen, Yulei Zhao, Yong Li, Xu Chen, Ning Ge, Sheng Chen
2018 IEEE Journal on Selected Areas in Communications  
Physical-layer security mechanism is typically employed to guarantee secure communications, at the cost of reducing the system's throughput.  ...  Furthermore, in order to provide implementation mechanism, we utilize matching theory to implement efficient resource allocation among multiple users.  ...  Obviously, M opt is a stable matching. Therefore, there exists at least one stable matching for our proposed matching game model.  ... 
doi:10.1109/jsac.2018.2825658 fatcat:qmwb6fvaaje7rkvnvecxafijzq

Smart Surveillance Security Systems 4s for Detection using SIFT and SURF in Image Processing

2020 International Journal of Engineering and Advanced Technology  
Feature-DetectorDescriptor plays a vital role in feature matching application for selection of feature; this paper presents a comparative analysis of SIFT, SURF, algorithms.  ...  Image registration is a development in which more than two images from various imaging equipment are reserved at various angles and at various times from the identical prospect and geometrically aligned  ...  DoG images are produced by image convolving with Gaussians at each octave of the scale space in the Gaussian Pyramid. Gaussian image is based on the number of octaves.  ... 
doi:10.35940/ijeat.c5147.029320 fatcat:sijpgpghxvfopn27vxcyy4khju

Performance of a possible Grid message infrastructure

Shrideep Pallickara, Geoffrey Fox, Ahmet Uyar, Hongbin Liu, Xi Rao, David Walker, Beytullah Yildiz
2005 Concurrency and Computation  
not necessarily secure, a security infrastructure that relies on message level security needs to be in place.  ...  Stable storages can be added/removed and the replication scheme can be updated. Stable stores can fail but they do need to recover within a finite amount of time.  ...  not necessarily secure, a security infrastructure that relies on message level security needs to be in place.  ... 
doi:10.1002/cpe.924 fatcat:z3cy5bmrqneg5aiepnezq42zey

A Feature Level Extraction based on Iris Recognition for Secure Biometric Authentication

Gourav Sachdeva, Bikrampal Kaur
2015 International Journal of Computer Applications  
The genetic algorithm is applied to optimize the features set as obtained by Scale invariant feature transform.  ...  This paper has proposed the hybridization of Hough Circular Transform, Scale Invariant Feature Transform and Genetic Algorithm.  ...  INTRODUCTION Imagine how advantageous it would be to actuate the security alert at your home with the touch of a finger, or to enter your home by simply putting your hand on the entryway handle [1] .  ... 
doi:10.5120/ijca2015905586 fatcat:gon2zobf2jc7vm7i25aeuhcgoi

Resource Allocation for Covert Communication in D2D Content Sharing: A Matching Game Approach

Xin Shi, Dan Wu, Chao Yue, Cheng Wan, Xinrong Guan
2019 IEEE Access  
of our scheme, covert constraints are learned by analyzing the detection performance at the warden, i.e., the security of D2D content sharing is guaranteed even considering some extremely adverse environments  ...  . 2) The joint spectrum allocation and power control is modeled as a two-sided matching problem and then reformulated as the one-to-one matching game based on the principle of mutual benefit, in order  ...  Definition 3 (Stable Matching): A matching µ is called stable, if and only if there does not exist a blocking pair {(D n , C m ) |D n ∈ D, C m ∈ C} that satisfies the following constraints at the same  ... 
doi:10.1109/access.2019.2919453 fatcat:x5vps6kvk5gjnnw5dfeva7zvm4

Efficient Iris Recognition by Characterizing Key Local Variations

L. Ma, T. Tan, Y. Wang, D. Zhang
2004 IEEE Transactions on Image Processing  
The binary sequence at each scale can be regarded as a periodic signal, hence we obtain translation invariant matching by circular shift After several circular shifts, the minimum matching score is taken  ...  Feature Vector There is an underlying relationship between information at consecutive scales The signals at finer scales are easily contaminated by noise.  ...  a scale then the responses of each quadrature pair of filter as forming a response vector A n (x,y) and Φ n .  ... 
doi:10.1109/tip.2004.827237 pmid:15648865 fatcat:2lgg5oprxbgrzfim3sl3lskboq

Regional Spatial Management Based on Supply–Demand Risk of Ecosystem Services—A Case Study of the Fenghe River Watershed

Hongjuan Zhang, Juan Feng, Zhicheng Zhang, Kang Liu, Xin Gao, Zidong Wang
2020 International Journal of Environmental Research and Public Health  
there are some areas within that are less than 0. (4) In terms of sub-watershed scale, except for SR, there are critically endangered areas for the other three ES.  ...  The results show that: (1) The supply and demand of SR are spatially matched, while the other three ES are spatially mismatched. (2) From 2000 to 2015, the supply amount of FP, WY, and SR increases by  ...  WY undersupplied and CR vulnerable zone refers to WY being at a stable but undersupplied level, and that CR is at a vulnerable level, while FP and SR are at a secure level.  ... 
doi:10.3390/ijerph17114112 pmid:32526942 fatcat:bmviqrr4svhvnpoj4woximnwem

Bio-cryptographic protocols with bipartite biotokens

W. J. Scheirer, T. E. Boult
2008 2008 Biometrics Symposium  
Cryptographic protocols are the foundation of secure network infrastructure, facilitating authentication, transactions, and data integrity.  ...  Since q is stable, we can encrypt or hash it for both probe and gallery data, and require exact matching.  ...  Rather it can just apply the final CRC computation to all the columns, so it does not reduce the security at this level at all.  ... 
doi:10.1109/bsym.2008.4655516 fatcat:squpo6gqzvcgjmyd2xfozmvxzi

Impact of fathers' alcoholism and associated risk factors on parent-infant attachment stability from 12 to 18 months

Ellen P. Edwards, Rina D. Eiden, Kenneth E. Leonard
2004 Infant Mental Health Journal  
secure.  ...  Stable insecure children also had higher levels of negative affect during parent-infant interactions and higher negative emotionality during other episodes compared to stable secure children.  ...  Three attachment groups reflecting stability/instability were computed: stable secure [secure at both 12 and 18 months, n = 105 (48%) mothers, n = 89 (43%) fathers], stable insecure [insecure at both 12  ... 
doi:10.1002/imhj.20027 pmid:19436769 pmcid:PMC2680299 fatcat:orl5m223ejgozgt2u7qn6jrcoa

Biometric Recognition: An Overview [chapter]

Anil K. Jain, Ajay Kumar
2012 The International Library of Ethics, Law and Technology  
to be applicable in large-scale identifi cation applications (1:N matching).  ...  A system's false match rate (FMR) and false non-match rate (FNMR) depend on the operating threshold; a large threshold score leads to a small FMR at the expense of a high FNMR.  ... 
doi:10.1007/978-94-007-3892-8_3 fatcat:yzz5vgaoojf2rpevkjoiipdq2q

A Perceptual Image Hashing Algorithm for Hybrid Document Security

Sebastien Eskenazi, Boris Bodin, Petra Gomez-Kramer, Jean-Marc Ogier
2017 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)  
They were scaled at three different sizes: 20 mm, 25 mm, 30 mm and they were printed by three printers: Sharp MX 36N, Lexmark x544 and Ricoh pro c7100x.  ...  Definition I.1 (Stable function).  ... 
doi:10.1109/icdar.2017.126 dblp:conf/icdar/EskenaziBGO17 fatcat:px7upmi35nfahnq6qfgaujwzya

The Delaunay Document Layout Descriptor

Sébastien Eskenazi, Petra Gomez-Krämer, Jean-Marc Ogier
2015 Proceedings of the 2015 ACM Symposium on Document Engineering - DocEng '15  
The vertical scale is logarithmic. Having two instabilities at the same time is enough to have a PFP below 1%.  ...  Figure 1 : Three layouts that we consider to be identical Now we need a layout descriptor that is at least as stable as the best segmentation algorithms.  ... 
doi:10.1145/2682571.2797059 dblp:conf/doceng/EskenaziGO15 fatcat:dbfiavrm6rehflyuazbenv27ne
« Previous Showing results 1 — 15 out of 165,172 results