Sciweavers

537 search results - page 58 / 108
» Problems from CGCS Luminy, May 2007
Sort
View
FC
2007
Springer
118views Cryptology» more  FC 2007»
15 years 5 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
GPC
2007
Springer
15 years 5 months ago
A Novel Data Grid Coherence Protocol Using Pipeline-Based Aggressive Copy Method
Grid systems are well-known for its high performance computing or large data storage with inexpensive devices. They can be categorized into two major types: computational grid and ...
Reen-Cheng Wang, Su-Ling Wu, Ruay-Shiung Chang
ICB
2007
Springer
148views Biometrics» more  ICB 2007»
15 years 5 months ago
Walker Recognition Without Gait Cycle Estimation
Abstract. Most of gait recognition algorithms involve walking cycle estimation to accomplish signature matching. However, we may be plagued by two cycle-related issues when develop...
Daoliang Tan, Shiqi Yu, Kaiqi Huang, Tieniu Tan
81
Voted
MIDDLEWARE
2007
Springer
15 years 5 months ago
On the integration of sensor networks and general purpose IT infrastructure
Integrating sensor networks with general purpose IT infrastructure has been confirmed as a complex problem in the development and management of industrial sensor applications. Th...
Wouter Horré, Sam Michiels, Nelson Matthys,...
PROFES
2007
Springer
15 years 5 months ago
Improving an Industrial Reference Process by Information Flow Analysis: A Case Study
Reference processes are supposed to be the basis for collaboration and mature cooperation in software development. Large business organizations need large and diverse reference pro...
Kai Stapel, Kurt Schneider, Daniel Lübke, Tho...