Sciweavers

5799 search results - page 1021 / 1160
» Position Paper
Sort
View
137
Voted
WINET
2010
91views more  WINET 2010»
15 years 1 months ago
Route duration modeling for mobile ad-hoc networks
In this paper, we present a model that estimates the time duration of routes formed by several intermediate nodes in mobile multi-hop ad-hoc networks. First, we analyze a 3-node ro...
Michael Pascoe-Chalke, Javier Gomez, Victor Rangel...
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
15 years 1 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
148
Voted
ICMI
2010
Springer
141views Biometrics» more  ICMI 2010»
15 years 1 months ago
Learning and evaluating response prediction models using parallel listener consensus
Traditionally listener response prediction models are learned from pre-recorded dyadic interactions. Because of individual differences in behavior, these recordings do not capture...
Iwan de Kok, Derya Ozkan, Dirk Heylen, Louis-Phili...
156
Voted
ICPR
2010
IEEE
15 years 1 months ago
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
Abstract--Boosting covariance data on Riemannian manifolds has proven to be a convenient strategy in a pedestrian detection context. In this paper we show that the detection perfor...
Diego Tosato, Michela Farenzena, Marco Cristani, V...
147
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...
« Prev « First page 1021 / 1160 Last » Next »