Sciweavers

1643 search results - page 265 / 329
» Consistability: Describing Usually Consistent Systems
Sort
View
ISCAS
2005
IEEE
95views Hardware» more  ISCAS 2005»
15 years 3 months ago
Area, power, and pin efficient bus transceiver using multi-bit-differential signaling
—This paper describes a new low-power, area and pin efficient alternative to differential encoding for high performance chip-to-chip and backplane signaling. The technique, calle...
Donald M. Chiarulli, Jason D. Bakos, Joel R. Marti...
LAWEB
2005
IEEE
15 years 3 months ago
Devices Descriptions for Context-Based Content Adaptation
Nowadays, networks can be accessed by multiple devices with different characteristics. Some of these characteristics such as low processing power and memory capacity restrict the ...
Robson Eisinger, Marcelo G. Manzato, Rudinei Goula...
WACV
2005
IEEE
15 years 3 months ago
Persistent Objects Tracking Across Multiple Non Overlapping Cameras
We present an approach for persistent tracking of moving objects observed by non-overlapping and moving cameras. Our approach robustly recovers the geometry of non-overlapping vie...
Jinman Kang, Isaac Cohen, Gérard G. Medioni
SIGIR
2005
ACM
15 years 3 months ago
On the collective classification of email "speech acts"
We consider classification of email messages as to whether or not they contain certain “email acts”, such as a request or a commitment. We show that exploiting the sequential ...
Vitor Rocha de Carvalho, William W. Cohen
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
15 years 3 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee