Sciweavers

1610 search results - page 92 / 322
» Identity Based Multisignatures
Sort
View
129
Voted
UMUAI
1998
101views more  UMUAI 1998»
15 years 2 months ago
An Evidential Model for Tracking Initiative in Collaborative Dialogue Interactions
In this paper, we argue for the need to distinguish between task initiative and dialogue initiative, and present an evidential model for tracking shifts in both types of initiativ...
Jennifer Chu-Carroll, Michael K. Brown
PAMI
2007
134views more  PAMI 2007»
15 years 2 months ago
Spatio-Temporal Context for Robust Multitarget Tracking
—In multitarget tracking, the main challenge is to maintain the correct identity of targets even under occlusions or when differences between the targets are small. The paper pro...
Hieu Tat Nguyen, Qiang Ji, Arnold W. M. Smeulders
117
Voted
CJ
2010
87views more  CJ 2010»
15 years 1 months ago
Resource-Aware Multimedia Content Delivery: A Gambling Approach
In this paper, we propose a resource-aware solution to achieving reliable and scalable stream diffusion in a probabilistic model, i.e., where communication links and processes are...
Mouna Allani, Benoît Garbinato, Fernando Ped...
145
Voted
ICOODB
2009
163views Database» more  ICOODB 2009»
15 years 23 days ago
Mapping XSD to OO Schemas
This paper presents algorithms that make it possible to process XML data that conforms to XML Schema (XSD) in a mainstream object-oriented programming language. These algorithms a...
Suad Alagic, Philip A. Bernstein
INFOCOM
2011
IEEE
14 years 6 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...