Sciweavers

291 search results - page 50 / 59
» Enforceable social laws
Sort
View
CCS
2006
ACM
15 years 1 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
ATC
2009
Springer
15 years 23 days ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
AAAI
2010
14 years 11 months ago
A Layered Approach to People Detection in 3D Range Data
People tracking is a key technology for autonomous systems, intelligent cars and social robots operating in populated environments. What makes the task difficult is that the appea...
Luciano Spinello, Kai Oliver Arras, Rudolph Triebe...
TMC
2008
164views more  TMC 2008»
14 years 9 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth
109
Voted
CVPR
2007
IEEE
15 years 11 months ago
Automatic Face Recognition from Skeletal Remains
The ability to determine the identity of a skull found at a crime scene is of critical importance to the law enforcement community. Traditional clay-based methods attempt to recon...
Carl Adrian, Nils Krahnstoever, Peter H. Tu, Phil ...