Sciweavers

1650 search results - page 273 / 330
» How to Turn the Page
Sort
View
TVCG
2010
205views more  TVCG 2010»
14 years 8 months ago
Estimation of Detection Thresholds for Redirected Walking Techniques
—In immersive virtual environments (IVEs) users can control their virtual viewpoint by moving their tracked head and by walking through the real world. Usually, movements in the ...
Frank Steinicke, Gerd Bruder, Jason Jerald, Harald...
ASIACRYPT
2010
Springer
14 years 7 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
EACL
2010
ACL Anthology
14 years 7 months ago
Generating Referring Expressions in Context: The GREC Task Evaluation Challenges
Until recently, referring expression generation (reg) research focused on the task of selecting the semantic content of definite mentions of listener-familiar discourse entities. I...
Anja Belz, Eric Kow, Jette Viethen, Albert Gatt
PIMRC
2010
IEEE
14 years 7 months ago
An implementation of Cognitive Resource Management on LTE platform
Abstract--In this paper we describe an LTE based demonstrator of the Universal Link Layer API (ULLA) and Cognitive Resource Manager (CRM) modules that are developed in ARAGORN proj...
Tao Cai, Georgios P. Koudouridis, Johan Johansson,...
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski