Sciweavers

3528 search results - page 647 / 706
» A New Approach to Planning in Networks
Sort
View
CVPR
2009
IEEE
15 years 4 months ago
Learning multi-modal densities on Discriminative Temporal Interaction Manifold for group activity recognition
While video-based activity analysis and recognition has received much attention, existing body of work mostly deals with single object/person case. Coordinated multi-object activi...
Ruonan Li, Rama Chellappa, Shaohua Kevin Zhou
GIS
2009
ACM
15 years 4 months ago
Proximate sensing using georeferenced community contributed photo collections
Volunteered geographic information such as that available in blogs, wikis, social networking sites, and community contributed photo collections is enabling new applications. This ...
Daniel Leung, Shawn Newsam
CSE
2009
IEEE
15 years 4 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi
TPHOL
2009
IEEE
15 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
WDAG
2009
Springer
103views Algorithms» more  WDAG 2009»
15 years 4 months ago
Distributed Discovery of Large Near-Cliques
Given an undirected graph and 0 ≤ ≤ 1, a set of nodes is called -near clique if all but an fraction of the pairs of nodes in the set have a link between them. In this paper we...
Zvika Brakerski, Boaz Patt-Shamir