Sciweavers

1200 search results - page 93 / 240
» Marked Ancestor Problems
Sort
View
76
Voted
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
15 years 6 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
89
Voted
GIR
2006
ACM
15 years 6 months ago
Identifying and grounding descriptions of places
In this paper we test the hypothesis Given a piece of text describing an object or concept our combined disambiguation method can disambiguate whether it is a place and ground it ...
Simon E. Overell, Stefan M. Rüger
116
Voted
WOWMOM
2006
ACM
158views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks
We investigate the problem of efficient resource control for elastic traffic in IEEE 802.11e’s Enhanced Distributed Channel Access (EDCA) mechanism. Our approach considers an ...
Vasilios A. Siris, Costas Courcoubetis
AUIC
2005
IEEE
15 years 6 months ago
Interaction With Partially Transparent Hands And Objects
Visual concealment of important objects and information by hands or tools can make many tasks more difficult. To alleviate this problem, hands and tools can be made partially tran...
Volkert Buchmann, Trond Nilsen, Mark Billinghurst
EEE
2005
IEEE
15 years 6 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry