Sciweavers

828 search results - page 129 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
157
Voted
CVIU
2010
429views more  CVIU 2010»
15 years 2 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
126
Voted
SAC
2009
ACM
15 years 9 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
109
Voted
ICDCS
2006
IEEE
15 years 8 months ago
CREW: A Gossip-based Flash-Dissemination System
In this paper, we explore a new form of dissemination called Flash Dissemination that involves dissemination of fixed, rich information to a large number of recipients in as shor...
Mayur Deshpande, Bo Xing, Iosif Lazaridis, Bijit H...
CORR
2010
Springer
158views Education» more  CORR 2010»
15 years 2 months ago
Active Architecture for Pervasive Contextual Services
Pervasive services may be defined as services that are available to any client (anytime, anywhere). Here we focus on the software and network infrastructure required to support pe...
Graham N. C. Kirby, Alan Dearle, Ronald Morrison, ...
131
Voted
AINA
2007
IEEE
15 years 9 months ago
Database-Driven Grid Computing with GridBASE
The GridBASE framework for database-driven grid computing is presented. The design and a prototype implementation of the framework is discussed. Industry-strength database technol...
Hans De Sterck, Chen Zhang, Aleks Papo