Sciweavers

1620 search results - page 247 / 324
» eg 2010
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
14 years 11 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CVIU
2010
429views more  CVIU 2010»
14 years 11 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
DEBU
2010
126views more  DEBU 2010»
14 years 11 months ago
GeoSIM: A Geospatial Data Collection System for Participatory Urban Texture Documentation
Participatory texture documentation (PTD) is a geospatial data collection process in which a group of users (dedicated individuals and/or general public) with camera-equipped mobi...
Farnoush Banaei Kashani, Houtan Shirani-Mehr, Bei ...
ECCC
2010
99views more  ECCC 2010»
14 years 11 months ago
A Unified Framework for Testing Linear-Invariant Properties
Abstract--There has been a sequence of recent papers devoted to understanding the relation between the testability of properties of Boolean functions and the invariance of the prop...
Arnab Bhattacharyya, Elena Grigorescu, Asaf Shapir...
ECCC
2010
80views more  ECCC 2010»
14 years 11 months ago
Regret Minimization for Online Buffering Problems Using the Weighted Majority Algorithm
Suppose a decision maker has to purchase a commodity over time with varying prices and demands. In particular, the price per unit might depend on the amount purchased and this pri...
Melanie Winkler, Berthold Vöcking, Sascha Geu...