Sciweavers

14078 search results - page 2716 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
TIFS
2010
186views more  TIFS 2010»
15 years 1 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
GROUP
2010
ACM
15 years 1 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
ANCS
2009
ACM
15 years 28 days ago
SPC-FA: synergic parallel compact finite automaton to accelerate multi-string matching with low memory
Deterministic Finite Automaton (DFA) is well-known for its constant matching speed in worst case, and widely used in multistring matching, which is a critical technique in high pe...
Junchen Jiang, Yi Tang, Bin Liu, Xiaofei Wang, Yan...
CVPR
2011
IEEE
14 years 10 months ago
A Large-scale Benchmark Dataset for Event Recognition in Surveillance Video
We introduce a new large-scale video dataset designed to assess the performance of diverse visual event recognition algorithms with a focus on continuous visual event recognition ...
Sangmin Oh, Anthony Hoogs, A.G.Amitha Perera, Chia...
NOSSDAV
2011
Springer
14 years 6 months ago
A measurement study of resource utilization in internet mobile streaming
The pervasive usage of mobile devices and wireless networking support have enabled more and more Internet streaming services to all kinds of heterogeneous mobile devices. However,...
Yao Liu, Fei Li, Lei Guo, Songqing Chen
« Prev « First page 2716 / 2816 Last » Next »