Sciweavers

681 search results - page 76 / 137
» et 2006
Sort
View
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
15 years 4 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
ISF
2008
92views more  ISF 2008»
14 years 9 months ago
Information technology workforce skills: The software and IT services provider perspective
It is now commonplace for an organization to turn to external firms for the provision of IT services and software. As technology advances and the business environment continues to ...
Tim Goles, Stephen Hawk, Kate M. Kaiser
AAAI
2008
14 years 12 months ago
Computational Influence for Training and Entertainment
2) a set of abstract drama manager; 3) a model of player response to drama manager actions; and 4) an author-specified evaluation function. The drama manager's task is to sele...
David L. Roberts
79
Voted
DAGM
2006
Springer
15 years 1 months ago
Nonparametric Density Estimation for Human Pose Tracking
The present paper considers the supplement of prior knowledge about joint angle configurations in the scope of 3-D human pose tracking. Training samples obtained from an industrial...
Thomas Brox, Bodo Rosenhahn, Uwe G. Kersting, Dani...
ICIP
2006
IEEE
15 years 11 months ago
Fast Non-Local Algorithm for Image Denoising
For the non-local denoising approach presented by Buades et al., remarkable denoising results are obtained at high expense of computational cost. In this paper, a new algorithm th...
Jin Wang, Yanwen Guo, Yiting Ying, Yanli Liu, Quns...