Sciweavers

2434 search results - page 202 / 487
» Algorithmic Randomness of Closed Sets
Sort
View
EUROCRYPT
2005
Springer
15 years 9 months ago
Fuzzy Identity-Based Encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. ...
Amit Sahai, Brent Waters
SDM
2008
SIAM
139views Data Mining» more  SDM 2008»
15 years 5 months ago
Proximity Tracking on Time-Evolving Bipartite Graphs
Given an author-conference network that evolves over time, which are the conferences that a given author is most closely related with, and how do they change over time? Large time...
Hanghang Tong, Spiros Papadimitriou, Philip S. Yu,...
TC
2008
15 years 4 months ago
A Geometric Transversal Approach to Analyzing Track Coverage in Sensor Networks
This paper presents a new coverage formulation addressing the quality of service of sensor networks that cooperatively detect targets traversing a region of interest. The problem o...
Kelli Baumgartner, Silvia Ferrari
ESA
1998
Springer
105views Algorithms» more  ESA 1998»
15 years 8 months ago
Maximizing Job Completions Online
We consider the problem of maximizingthe number of jobs completed by their deadlinein an online single processor system where the jobs are preemptable and have release times. So i...
Bala Kalyanasundaram, Kirk Pruhs
ICMCS
2008
IEEE
211views Multimedia» more  ICMCS 2008»
15 years 10 months ago
A real-time video surveillance system with human occlusion handling using nonlinear regression
This paper presents a real-time single-camera surveillance system, aiming at detecting and partly analyzing a group of people. A set of moving persons is segmented using a combina...
Jungong Han, Minwei Feng, Peter H. N. de With