Sciweavers

17983 search results - page 3430 / 3597
» Set Types and Applications
Sort
View
IWCMC
2009
ACM
15 years 10 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
135
Voted
MM
2009
ACM
245views Multimedia» more  MM 2009»
15 years 10 months ago
Concept detectors: how good is good enough?
Today, semantic concept based video retrieval systems often show insufficient performance for real-life applications. Clearly, a big share of the reason is the lacking performance...
Robin Aly, Djoerd Hiemstra
135
Voted
MM
2009
ACM
209views Multimedia» more  MM 2009»
15 years 10 months ago
Brain state decoding for rapid image retrieval
Human visual perception is able to recognize a wide range of targets under challenging conditions, but has limited throughput. Machine vision and automatic content analytics can p...
Jun Wang, Eric Pohlmeyer, Barbara Hanna, Yu-Gang J...
131
Voted
VRST
2009
ACM
15 years 10 months ago
Judgment of natural perspective projections in head-mounted display environments
The display units integrated in todays head-mounted displays (HMDs) provide only a limited field of view (FOV) to the virtual world. In order to present an undistorted view to th...
Frank Steinicke, Gerd Bruder, Klaus Hinrichs, Scot...
AFRICACRYPT
2010
Springer
15 years 10 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...
« Prev « First page 3430 / 3597 Last » Next »