Sciweavers

459 search results - page 56 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An Online Video Composition System
This paper presents an information-driven online video composition system. The composition work handled by the system includes dynamically setting multiple pan/tilt/zoom (PTZ) cam...
Qiong Liu, Xiaojin Shi, Don Kimber, Frank Zhao, Fr...
INFOCOM
2010
IEEE
13 years 6 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
ITSSA
2006
182views more  ITSSA 2006»
13 years 7 months ago
Evaluation of a Multi-Agent System for Hospital Patient Scheduling
: The problem of patient scheduling in hospitals is characterized by high uncertainty and dynamics in patient treatments. Additional complexity in the planning and coordination pro...
Anja Zöller, Lars Braubach, Alexander Pokahr,...
EDBT
2004
ACM
122views Database» more  EDBT 2004»
14 years 7 months ago
Sketch-Based Multi-query Processing over Data Streams
Abstract. Recent years have witnessed an increasing interest in designing algorithms for querying and analyzing streaming data (i.e., data that is seen only once in a fixed order) ...
Alin Dobra, Minos N. Garofalakis, Johannes Gehrke,...