Sciweavers

8450 search results - page 1402 / 1690
» Interactively Modeling with Photogrammetry
Sort
View
134
Voted
FOCS
2007
IEEE
15 years 11 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
INFOCOM
2007
IEEE
15 years 11 months ago
Cross-Layer Analysis of Rate Adaptation, DCF and TCP in Multi-Rate WLANs
—Wireless Internet access is facilitated by IEEE 802.11 WLANs that, in addition to realizing a specific form of CSMA/CA—distributed coordination function (DCF)— implement a ...
Jaehyuk Choi, Kihong Park, Chongkwon Kim
FASE
2007
Springer
15 years 11 months ago
Activity-Driven Synthesis of State Machines
The synthesis of object behaviour from scenarios is a well-known and important issue in the transition from system analysis to system design. We describe a model transformation pro...
Rolf Hennicker, Alexander Knapp
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 10 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
ISWC
2006
IEEE
15 years 10 months ago
Discovering Characteristic Actions from On-Body Sensor Data
We present an approach to activity discovery, the unsupervised identification and modeling of human actions embedded in a larger sensor stream. Activity discovery can be seen as ...
David Minnen, Thad Starner, Irfan A. Essa, Charles...
« Prev « First page 1402 / 1690 Last » Next »