Sciweavers

5344 search results - page 323 / 1069
» Privacy-Preserving Set Operations
Sort
View
IJON
2006
53views more  IJON 2006»
15 years 4 months ago
Sub-intrapersonal space analysis for face recognition
Bayesian subspace analysis has been successfully applied in face recognition. However, it suffers from its operating on a whole face difference and using one global linear subspac...
Xiaoyang Tan, Jun Liu, Songcan Chen
JCO
2006
150views more  JCO 2006»
15 years 4 months ago
Efficient algorithms for shared backup allocation in networks with partial information
Abstract. We study efficient algorithms for establishing reliable connections with bandwidth guarantees in communication networks. In the normal mode of operation, each connection ...
Yigal Bejerano, Joseph Naor, Alexander Sprintson
ENTCS
2007
94views more  ENTCS 2007»
15 years 4 months ago
Virtual Organizations in Arigatoni
Arigatoni is a lightweight overlay network that deploys the Global Computing Paradigm over the Internet. Communication for over the behavioral units of the overlay is performed by...
Michel Cosnard, Luigi Liquori, Raphaël Chand
PERVASIVE
2006
Springer
15 years 4 months ago
Using a Live-In Laboratory for Ubiquitous Computing Research
Abstract. Ubiquitous computing researchers are increasingly turning to sensorenabled "living laboratories" for the study of people and technologies in settings more natur...
Stephen S. Intille, Kent Larson, Emmanuel Munguia ...
JCP
2007
104views more  JCP 2007»
15 years 4 months ago
Cyclic Convolution Algorithm Formulations Using Polynomial Transform Theory
— This work presents a mathematical framework for the development of efficient algorithms for cyclic convolution computations. The framework is based on the Chinese Reminder Theo...
Abraham H. Diaz-Perez, Domingo Rodríguez