Sciweavers

5692 search results - page 141 / 1139
» Challenges and Unsolved Problems
Sort
View
AFRICACRYPT
2010
Springer
15 years 7 months ago
ECC2K-130 on Cell CPUs
This paper describes an implementation of Pollard’s rho algorithm to compute the elliptic curve discrete logarithm for the Synergistic Processor Elements of the Cell Broadband En...
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhage...
ESORICS
2009
Springer
15 years 7 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
ICB
2009
Springer
190views Biometrics» more  ICB 2009»
15 years 7 months ago
Robust Human Detection under Occlusion by Integrating Face and Person Detectors
Human detection under occlusion is a challenging problem in computer vision. We address this problem through a framework which integrates face detection and person detection. We ï¬...
William Robson Schwartz, Raghuraman Gopalan, Rama ...
83
Voted
IAT
2008
IEEE
15 years 7 months ago
Bargaining in Markets with One-Sided Competition: Model and Analysis
The automation of agents that bargain within markets is a challenging open problem. In these settings a seller agent can take advantage from the competition among several buyer ag...
Nicola Gatti
132
Voted
ADC
2008
Springer
110views Database» more  ADC 2008»
15 years 7 months ago
Graph Mining based on a Data Partitioning Approach
Existing graph mining algorithms typically assume that the dataset can fit into main memory. As many large graph datasets cannot satisfy this condition, truly scalable graph minin...
Son N. Nguyen, Maria E. Orlowska, Xue Li