Sciweavers

1244 search results - page 223 / 249
» The many faces of interpolation
Sort
View
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 5 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
AVSS
2006
IEEE
15 years 5 months ago
3D Human Motion Analysis in Monocular Video Techniques and Challenges
Extracting meaningful 3D human motion information from video sequences is of interest for applications like intelligent humancomputer interfaces, biometrics, video browsing and ind...
Cristian Sminchisescu
SUTC
2006
IEEE
15 years 5 months ago
Detection and Repair of Software Errors in Hierarchical Sensor Networks
Abstract— Sensor networks are being increasingly deployed for collecting critical data in various applications. Once deployed, a sensor network may experience faults at the indiv...
Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Z...
ACMSE
2006
ACM
15 years 5 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
ASSETS
2006
ACM
15 years 5 months ago
Attention analysis in interactive software for children with autism
This work is a part of an ongoing project that focuses on potential applications of an interactive system that helps children with autism. Autism is classified as a neurodevelopm...
A. Ould Mohamed, Vincent Courboulay, Karim Sehaba,...