Sciweavers

9186 search results - page 1673 / 1838
» A Module System for Scheme
Sort
View
CONEXT
2007
ACM
14 years 2 months ago
Practical service provisioning for wireless meshes
Community wireless mesh networks (WMNs) are increasingly being deployed for providing cheap, low maintenance Internet access. For the successful adoption of WMNs as a last-mile te...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
DASFAA
2007
IEEE
191views Database» more  DASFAA 2007»
14 years 2 months ago
ABIDE: A Bid-Based Economic Incentive Model for Enticing Non-cooperative Peers in Mobile-P2P Networks
In mobile ad-hoc peer-to-peer (M-P2P) networks, a large percentage of the mobile peers typically do not provide any service to the network, thereby motivating incentive schemes for...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...
DCOSS
2007
Springer
14 years 2 months ago
Energy Efficient Intrusion Detection in Camera Sensor Networks
The problem we address in this paper is how to detect an intruder moving through a polygonal space that is equipped with a camera sensor network. We propose a probabilistic sensor ...
Primoz Skraba, Leonidas J. Guibas
ECCV
2010
Springer
14 years 2 months ago
Closed-loop Adaptation for Robust Tracking
Model updating is a critical problem in tracking. Inaccurate extraction of the foreground and background information in model adaptation would cause the model to drift and degrade ...
CSFW
2010
IEEE
14 years 2 months ago
A Machine-Checked Formalization of Sigma-Protocols
—Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming from the fact that they can be used to force potentially malicious parties to abide by th...
Gilles Barthe, Daniel Hedin, Santiago Zanella B&ea...
« Prev « First page 1673 / 1838 Last » Next »