Sciweavers

109 search results - page 16 / 22
» How to Make ad-hoc Polymorphism Less ad-hoc
Sort
View
CVPR
2004
IEEE
15 years 11 months ago
Gibbs Likelihoods for Bayesian Tracking
Bayesian methods for visual tracking model the likelihood of image measurements conditioned on a tracking hypothesis. Image measurements may, for example, correspond to various fi...
Stefan Roth, Leonid Sigal, Michael J. Black
EUROCRYPT
2009
Springer
15 years 10 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
ISPAN
2002
IEEE
15 years 2 months ago
A Self-Routing Topology for Bluetooth Scatternets
—The emerging Bluetooth standard is considered to be the most promising technology to construct ad-hoc networks. It contains specifications on how to build a piconet but left ou...
Min-Te Sun, Chung-Kuo Chang, Ten-Hwang Lai
116
Voted
IPCCC
2007
IEEE
15 years 3 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
ARCS
2004
Springer
15 years 2 months ago
The Value of Handhelds in Smart Environments
Abstract. The severe resource restrictions of computer-augmented everyday artifacts imply substantial problems for the design of applications in smart environments. Some of these p...
Frank Siegemund, Christian Floerkemeier, Harald Vo...