Sciweavers

683 search results - page 94 / 137
» Unique Group Signatures
Sort
View
CSFW
2010
IEEE
15 years 3 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
ECOOP
2006
Springer
15 years 3 months ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan
CLEF
2008
Springer
15 years 1 months ago
Medical Image Annotation in ImageCLEF 2008
Abstract. The ImageCLEF 2008 medical image annotation task is designed to assess the quality of content-based image retrieval and image classification by means of global signatures...
Thomas Deselaers, Thomas Martin Deserno
AAAI
2010
15 years 1 months ago
Community-Guided Learning: Exploiting Mobile Sensor Users to Model Human Behavior
Modeling human behavior requires vast quantities of accurately labeled training data, but for ubiquitous people-aware applications such data is rarely attainable. Even researchers...
Daniel Peebles, Hong Lu, Nicholas D. Lane, Tanzeem...
CVGIP
2006
171views more  CVGIP 2006»
14 years 12 months ago
Breathe easy: Model and control of human respiration for computer animation
In this paper, we detail an anatomically inspired, physically based model of the human torso designed for the visual simulation of respiration using a mixed system of rigid and de...
Victor B. Zordan, Bhrigu Celly, Bill Yuan-chi Chiu...