Sciweavers

188 search results - page 26 / 38
» Practical Two-Party Computation Based on the Conditional Gat...
Sort
View
FC
2006
Springer
94views Cryptology» more  FC 2006»
15 years 3 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
ENTCS
2007
145views more  ENTCS 2007»
14 years 11 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...
ICCV
2001
IEEE
16 years 1 months ago
Do Ambiguous Reconstructions Always Give Ambiguous Images?
In many cases self-calibration is not able to yield a unique solution for the 3D reconstruction of a scene. This is due to the occurrence of critical motion sequences. If this is ...
Marc Pollefeys, Luc J. Van Gool
ATC
2009
Springer
15 years 6 months ago
Management without (Detailed) Models
We present a resource management algorithm based upon guided “walks” within a system state space. Walks are guided via simple predictions of optimum behavior whose accuracy inc...
Alva L. Couch, Mark Burgess, Marc Chiarini
ICT
2004
Springer
127views Communications» more  ICT 2004»
15 years 5 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...