Sciweavers

9210 search results - page 1518 / 1842
» Analyzing Real-Time Systems
Sort
View
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 11 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
CCS
2007
ACM
15 years 11 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
CIA
2007
Springer
15 years 11 months ago
Analysis of Negotiation Dynamics
The process of reaching an agreement in a bilateral negotiation to a large extent determines that agreement. The tactics of proposing an offer and the perception of offers made by ...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
CIVR
2007
Springer
15 years 11 months ago
Comparison of face matching techniques under pose variation
The ability to match faces in video is a crucial component for many multimedia applications such as searching and recognizing people in semantic video browsing, surveillance and h...
Bart Kroon, Alan Hanjalic, Sabri Boughorbel
COLT
2007
Springer
15 years 11 months ago
Minimax Bounds for Active Learning
This paper analyzes the potential advantages and theoretical challenges of “active learning” algorithms. Active learning involves sequential sampling procedures that use infor...
Rui Castro, Robert D. Nowak
« Prev « First page 1518 / 1842 Last » Next »