Sciweavers

164 search results - page 24 / 33
» Bootstrapping of Peer-to-Peer Networks
Sort
View
83
Voted
ICISC
2008
89views Cryptology» more  ICISC 2008»
14 years 11 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
NN
2007
Springer
106views Neural Networks» more  NN 2007»
14 years 9 months ago
Machine learning approach to color constancy
A number of machine learning (ML) techniques have recently been proposed to solve color constancy problem in computer vision. Neural networks (NNs) and support vector regression (...
Vivek Agarwal, Andrei V. Gribok, Mongi A. Abidi
IMC
2010
ACM
14 years 7 months ago
Measuring the mixing time of social graphs
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim
WIMOB
2008
IEEE
15 years 3 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
CVPR
2009
IEEE
16 years 4 months ago
Physiological Face Recognition Is Coming of Age
The previous work of the authors has shown that physiological information on the face can be extracted from thermal infrared imagery and can be used as a biometric. Although, th...
Pradeep Buddharaju (University of Houston), Ioanni...