Sciweavers

1363 search results - page 269 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
TIFS
2010
130views more  TIFS 2010»
14 years 5 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
DCC
2011
IEEE
14 years 5 months ago
Robust Learning of 2-D Separable Transforms for Next-Generation Video Coding
With the simplicity of its application together with compression efficiency, the Discrete Cosine Transform(DCT) plays a vital role in the development of video compression standar...
Osman Gokhan Sezer, Robert A. Cohen, Anthony Vetro
BIB
2011
14 years 2 months ago
Using cross-validation to evaluate predictive accuracy of survival risk classifiers based on high-dimensional data
Developments in whole genome biotechnology have stimulated statistical focus on prediction methods. We review here methodology for classifying patients into survival risk groups a...
Richard M. Simon, Jyothi Subramanian, Ming-Chung L...
CHI
2011
ACM
14 years 2 months ago
PhotoCity: training experts at large-scale image acquisition through a competitive game
Large-scale, ground-level urban imagery has recently developed as an important element of online mapping tools such as Google’s Street View. Such imagery is extremely valuable i...
Kathleen Tuite, Noah Snavely, Dun-yu Hsiao, Nadine...
CHI
2011
ACM
14 years 2 months ago
CommentSpace: structured support for collaborative visual analysis
Collaborative visual analysis tools can enhance sensemaking by facilitating social interpretation and parallelization of effort. These systems enable distributed exploration and e...
Wesley Willett, Jeffrey Heer, Joseph M. Hellerstei...