Sciweavers

4529 search results - page 859 / 906
» Position Based Cryptography
Sort
View
ENC
2004
IEEE
15 years 4 months ago
Feature Selection for Visual Gesture Recognition Using Hidden Markov Models
Hidden Markov models have become the preferred technique for visual recognition of human gestures. However, the recognition rate depends on the set of visual features used, and al...
José Antonio Montero, Luis Enrique Sucar
106
Voted
CONCUR
2006
Springer
15 years 4 months ago
Sanity Checks in Formal Verification
One of the advantages of temporal-logic model-checking tools is their ability to accompany a negative answer to the correctness query by a counterexample to the satisfaction of the...
Orna Kupferman
132
Voted
DRM
2006
Springer
15 years 4 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
130
Voted
INFOCOM
2000
IEEE
15 years 4 months ago
A Predictability Analysis of Network Traffic
This paper assesses the predictability of network traffic by considering two metrics: (1) how far into the future a traffic rate process can be predicted with bounded error; (2) w...
Aimin Sang, San-qi Li
SC
1995
ACM
15 years 4 months ago
Analysis of Multilevel Graph Partitioning
Recently, a number of researchers have investigated a class of algorithms that are based on multilevel graph partitioning that have moderate computational complexity, and provide ...
George Karypis, Vipin Kumar