Sciweavers

2421 search results - page 180 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
139
Voted
ICCV
1995
IEEE
15 years 7 months ago
3D Human Body Model Acquisition from Multiple Views
We present a novel motion-based approach for the part determination and shape estimation of a human’s body parts. The novelty of the technique is that neither a prior model of t...
Ioannis A. Kakadiaris, Dimitris N. Metaxas
137
Voted
ACISP
2008
Springer
15 years 10 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
MOBICOM
2004
ACM
15 years 9 months ago
Fairness and load balancing in wireless LANs using association control
—The traffic load of wireless LANs is often unevenly distributed among the access points (APs), which results in unfair bandwidth allocation among users. We argue that the load ...
Yigal Bejerano, Seung-Jae Han, Erran L. Li
140
Voted
CAISE
1999
Springer
15 years 7 months ago
Towards a Classification Framework for Application Granularity in Workflow Management Systems
The support of process enactment through the use of workflow management systems has gained considerable attention within the last few years. We develop a classification framework c...
Jörg Becker, Michael zur Muehlen
142
Voted
AIR
2004
111views more  AIR 2004»
15 years 3 months ago
Towards Fast Vickrey Pricing using Constraint Programming
Ensuring truthfulness amongst self-interested agents bidding against one another in an auction can be computationally expensive when prices are determined using the Vickrey-Clarke-...
Alan Holland, Barry O'Sullivan