Sciweavers

1628 search results - page 172 / 326
» Compiler Construction Using Scheme
Sort
View
JCP
2006
120views more  JCP 2006»
15 years 5 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
154
Voted
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 5 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
TOG
2008
92views more  TOG 2008»
15 years 4 months ago
Self-animating images: illusory motion using repeated asymmetric patterns
Illusory motion in a still image is a fascinating research topic in the study of human motion perception. Physiologists and psychologists have attempted to understand this phenome...
Ming-Te Chi, Tong-Yee Lee, Yingge Qu, Tien-Tsin Wo...
CVPR
2003
IEEE
16 years 7 months ago
Video-Based Face Recognition Using Probabilistic Appearance Manifolds
This paper presents a novel method to model and recognize human faces in video sequences. Each registered person is represented by a low-dimensional appearance manifold in the amb...
Kuang-Chih Lee, Jeffrey Ho, Ming-Hsuan Yang, David...
ICISS
2009
Springer
15 years 11 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...