Sciweavers

459 search results - page 72 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao
I3E
2009
134views Business» more  I3E 2009»
13 years 5 months ago
Realizing Mobile Web Services for Dynamic Applications
Use of web services also on mobile devices becomes increasingly relevant. However, realizing such mobile web services based on the standard protocol stack is often inappropriate f...
Sonja Zaplata, Viktor Dreiling, Winfried Lamersdor...
AIRS
2010
Springer
13 years 5 months ago
Event Recognition from News Webpages through Latent Ingredients Extraction
We investigate the novel problem of event recognition from news webpages. "Events" are basic text units containing news elements. We observe that a news article is always...
Rui Yan, Yu Li, Yan Zhang, Xiaoming Li
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CVPR
2012
IEEE
11 years 10 months ago
We are not contortionists: Coupled adaptive learning for head and body orientation estimation in surveillance video
In this paper, we deal with the estimation of body and head poses (i.e orientations) in surveillance videos, and we make three main contributions. First, we address this issue as ...
Cheng Chen, Jean-Marc Odobez