Sciweavers

729 search results - page 56 / 146
» And Or Hierarchies and Round Abstraction
Sort
View
SAMT
2007
Springer
99views Multimedia» more  SAMT 2007»
14 years 4 months ago
User-Centric Retrieval of Visual Surveillance Content
Abstract—An interactive retrieval method adapted to surveillance video is presented. The approach is formulated as an iterative SVM classification and builds upon the two major ...
Jérôme Meessen, Xavier Desurmont, Chr...
TCC
2007
Springer
145views Cryptology» more  TCC 2007»
14 years 4 months ago
(Password) Authenticated Key Establishment: From 2-Party to Group
Abstract. A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment...
Michel Abdalla, Jens-Matthias Bohli, Maria Isabel ...
ICN
2005
Springer
14 years 3 months ago
Packet Scheduling Across Networks of Switches
Abstract. Recent developments in computer and communication networks require scheduling decisions to be made under increasingly complex system dynamics. We model and analyze the pr...
Kevin Ross, Nicholas Bambos
ISW
2005
Springer
14 years 3 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...
ECAI
2004
Springer
14 years 3 months ago
A System for Pacemaker Treatment Advice
Abstract. Previously it has been shown that the process of programming a cardiac pacemaker can be described in terms of the theory of diagnosis. A set-theoretical framework of diag...
Peter J. F. Lucas, Ruud Kuipers, Frederick Feith