Sciweavers

3091 search results - page 225 / 619
» The Color Between Two Others
Sort
View
ACCV
2006
Springer
15 years 10 months ago
Visual Surveillance Using Less ROIs of Multiple Non-calibrated Cameras
With a large number of surveillance cameras, it is not an easy task to determine which camera should be monitored and which region of the camera images should be checked so that al...
Takashi Nishizaki, Yoshinari Kameda, Yuichi Ohta
BROADNETS
2005
IEEE
15 years 9 months ago
Network selection using fuzzy logic
—The peer-to-peer technology offers many advantages, but at the same time, it poses many novel challenges for the research community. Modern peer-to-peer systems are characterize...
Shubha Kher, Arun K. Somani, Rohit Gupta
CSFW
2005
IEEE
15 years 9 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
AOSE
2005
Springer
15 years 9 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 9 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova