Sciweavers

1923 search results - page 116 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
ICDCS
2009
IEEE
15 years 7 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu
MM
2003
ACM
239views Multimedia» more  MM 2003»
15 years 3 months ago
Foreground object detection from videos containing complex background
This paper proposes a novel method for detection and segmentation of foreground objects from a video which contains both stationary and moving background objects and undergoes bot...
Liyuan Li, Weimin Huang, Irene Y. H. Gu, Qi Tian
HPDC
2003
IEEE
15 years 3 months ago
Adaptive Polling of Grid Resource Monitors Using a Slacker Coherence Model
As Data and Computational Grids grow in size and complexity, the crucial task of identifying, monitoring and utilizing available resources in an efficient manner is becoming incr...
Radhakrishnan Sundaresan, Mario Lauria, Tahsin M. ...
JCP
2006
135views more  JCP 2006»
14 years 9 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
ICPR
2010
IEEE
15 years 4 months ago
Integrating a Discrete Motion Model into GMM Based Background Subtraction
GMM based algorithms have become the de facto standard for background subtraction in video sequences, mainly because of their ability to track multiple background distributions, w...
Christian Wolf, Jolion Jolion