Sciweavers

1573 search results - page 282 / 315
» Strong User Authentication
Sort
View
65
Voted
ICPR
2010
IEEE
14 years 10 months ago
Activity-Aware Map: Identifying Human Daily Activity Pattern Using Mobile Phone Data
Being able to understand dynamics of human mobility is essential for urban planning and transportation management. Besides geographic space, in this paper, we characterize mobility...
Santi Phithakkitnukoon, Teerayut Horanont, Giusy D...
CGF
2008
144views more  CGF 2008»
14 years 9 months ago
Deformation-Driven Shape Correspondence
Non-rigid 3D shape correspondence is a fundamental and difficult problem. Most applications which require a correspondence rely on manually selected markers. Without user assistan...
Hao Zhang 0002, Alla Sheffer, Daniel Cohen-Or, Qua...
CORR
2010
Springer
89views Education» more  CORR 2010»
14 years 9 months ago
SHIELD: Social sensing and Help In Emergency using mobiLe Devices
School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g....
Gautam S. Thakur, Mukul Sharma, Ahmed Helmy
CORR
2010
Springer
84views Education» more  CORR 2010»
14 years 9 months ago
Outage Probability for Multi-Cell Processing under Rayleigh Fading
Abstract--Multi-cell processing, also called Coordinated Multiple Point (CoMP), is a very promising distributed multi-antennas technique that uses neighbour cell's antennas. T...
Virgile Garcia, Jean-Marie Gorce, Nikolai Lebedev
IJNSEC
2008
154views more  IJNSEC 2008»
14 years 9 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao