Sciweavers

6360 search results - page 1112 / 1272
» Attentive Presentation Agents
Sort
View
RTAS
2009
IEEE
14 years 3 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
14 years 3 months ago
Scalable Algorithms for Distribution Search
Distribution data naturally arise in countless domains, such as meteorology, biology, geology, industry and economics. However, relatively little attention has been paid to data m...
Yasuko Matsubara, Yasushi Sakurai, Masatoshi Yoshi...
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
ECTEL
2009
Springer
14 years 2 months ago
Distributed Awareness for Class Orchestration
The orchestration process consists of managing classroom interactions at multiple levels: individual activities, teamwork and class-wide sessions. We study the process of orchestra...
Hamed S. Alavi, Pierre Dillenbourg, Fréd&ea...
LOCA
2009
Springer
14 years 2 months ago
Error Estimation for Indoor 802.11 Location Fingerprinting
802.11-based indoor positioning systems have been under research for quite some time now. However, despite the large attention this topic has gained, most of the research focused o...
Hendrik Lemelson, Mikkel Baun Kjærgaard, Ren...
« Prev « First page 1112 / 1272 Last » Next »