Sciweavers

42738 search results - page 8299 / 8548
» Search Computing Systems
Sort
View
NDSS
2003
IEEE
15 years 8 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
144
Voted
P2P
2003
IEEE
205views Communications» more  P2P 2003»
15 years 8 months ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu
197
Voted
DAC
2003
ACM
15 years 8 months ago
Instruction set compiled simulation: a technique for fast and flexible instruction set simulation
Instruction set simulators are critical tools for the exploration and validation of new programmable architectures. Due to increasing complexity of the architectures and timeto-ma...
Mehrdad Reshadi, Prabhat Mishra, Nikil D. Dutt
150
Voted
MM
2003
ACM
241views Multimedia» more  MM 2003»
15 years 8 months ago
Invariance in motion analysis of videos
In this paper, we propose an approach that retrieves motion of objects from the videos based on the dynamic time warping of view invariant characteristics. The motion is represent...
Cen Rao, Mubarak Shah, Tanveer Fathima Syeda-Mahmo...
148
Voted
MOBICOM
2003
ACM
15 years 8 months ago
Minimum energy disjoint path routing in wireless ad-hoc networks
We develop algorithms for finding minimum energy disjoint paths in an all-wireless network, for both the node and linkdisjoint cases. Our major results include a novel polynomial...
Anand Srinivas, Eytan Modiano
« Prev « First page 8299 / 8548 Last » Next »