Sciweavers

1396 search results - page 167 / 280
» A Tale of Two Futures
Sort
View
EUROPKI
2007
Springer
15 years 7 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
HRI
2007
ACM
15 years 7 months ago
On-line behaviour classification and adaptation to human-robot interaction styles
This paper presents a proof-of-concept of a robot that is adapting its behaviour on-line, during interactions with a human according to detected play styles. The study is part of ...
Dorothée François, Daniel Polani, Ke...
122
Voted
ACCV
2006
Springer
15 years 7 months ago
Key Frame-Based Activity Representation Using Antieigenvalues
Many activities may be characterized by a sequence of key frames that are related to important changes in motion rather than dominant characteristics that persist over a long seque...
Naresh P. Cuntoor, Rama Chellappa
CCGRID
2004
IEEE
15 years 7 months ago
Learning Grid technologies in a project-based computer architecture course
This paper describes the integration of the grid topic within a Computer Architecture engineering course. Students are engaged in a project of design and evaluation of computing s...
Guillermo Vega-Gorgojo, Yannis A. Dimitriadis, Edu...
AUSDM
2006
Springer
110views Data Mining» more  AUSDM 2006»
15 years 7 months ago
Discovering Debtor Patterns of Centrelink Customers
Data mining is currently becoming an increasingly hot research field, but a large gap still remains between the research of data mining and its application in real-world business....
Yanchang Zhao, Longbing Cao, Yvonne Morrow, Yuming...