Sciweavers

683 search results - page 72 / 137
» Unique Group Signatures
Sort
View
ROBOCOMM
2007
IEEE
15 years 6 months ago
Autonomous navigation of wireless robot swarms with covert leaders
— The integration of advanced computation, wireless communication, and control technologies has facilitated the creation of autonomous robot swarms for many civil and military ap...
Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
15 years 4 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
INFOCOM
2000
IEEE
15 years 4 months ago
REUNITE: A Recursive Unicast Approach to Multicast
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...
Ion Stoica, T. S. Eugene Ng, Hui Zhang
BMVC
2010
14 years 10 months ago
Classifying Textile Designs using Region Graphs
Markov random field pixel labelling is often used to obtain image segmentations in which each segment or region is labelled according to its attributes such as colour or texture. ...
Wei Jia, Stephen J. McKenna, Annette A. Ward, Keit...
CHI
2008
ACM
16 years 8 days ago
Information spaces - building meeting rooms in virtual environments
Virtual worlds are typically designed to recreate the familiar physical world, both in the design of the spaces and the ways that people interact within them. In this paper we des...
Drew Harry, Judith S. Donath