Sciweavers

7168 search results - page 186 / 1434
» A Factorization Approach to Grouping
Sort
View
CADE
2008
Springer
16 years 4 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
CVPR
2010
IEEE
16 years 16 hour ago
Automatic Image Annotation Using Group Sparsity
Automatically assigning relevant text keywords to images is an important problem. Many algorithms have been proposed in the past decade and achieved good performance. Efforts have...
Shaoting Zhang, Junzhou Huang, Yuchi Huang, Yang Y...
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 10 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
HPCC
2007
Springer
15 years 10 months ago
Multi-domain Topology-Aware Grouping for Application-Layer Multicast
Application-layer multicast (ALM) can solve most of the problems of IP-based multicast. Topology-aware approach of ALM is more attractive because it exploits underlying network top...
Jianqun Cui, Yanxiang He, Libing Wu, Naixue Xiong,...
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 10 months ago
The Effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
Anne-Françoise Rutkowski, Bartel Van de Wal...