Sciweavers

7168 search results - page 162 / 1434
» A Factorization Approach to Grouping
Sort
View
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 10 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003
ICIP
2007
IEEE
15 years 10 months ago
Group Activity Recognition Based on ARMA Shape Sequence Modeling
In this paper, we propose a system identification approach for group activity recognition in traffic surveillance. Statistical shape theory is used to extract features, and then...
Ying Wang, Kaiqi Huang, Tieniu Tan
ADVIS
2004
Springer
15 years 9 months ago
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme
Emerging peer-to-peer services such as Freenet, Gnutella, Kazaa, and Napster provide an easy and efficient way to share resources and information. However, misuse or unfair exploit...
Hoh Peter In, Konstantinos A. Meintanis, Ming Zhan...
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 9 months ago
The Impacts of Delphi Communication Structure on Small and Medium Sized Asynchronous Groups: Preliminary Results
Communication structure is a way of improving the effectiveness of group communications by coordinating group members’ individual efforts. This study investigates the use of Del...
Hee-Kyung Cho, Murray Turoff, Starr Roxanne Hiltz
IJNSEC
2008
126views more  IJNSEC 2008»
15 years 4 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli