Sciweavers

529 search results - page 17 / 106
» C Essentials
Sort
View
CVPR
2008
IEEE
14 years 2 months ago
Visual quasi-periodicity
Periodicity is at the core of the recognition of many actions. This paper takes the following steps to detect and measure periodicity. 1) We establish a conceptual framework of cl...
Erik Pogalin, Arnold W. M. Smeulders, Andrew H. C....
CCS
2006
ACM
13 years 11 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
IJNSEC
2008
72views more  IJNSEC 2008»
13 years 7 months ago
Bandwidth-Conserving Multicast VoIP Teleconference System
Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while...
Teck-Kuen Chua, David C. Pheanis
CF
2004
ACM
14 years 1 months ago
The digital divide of computing
This presentation urges for creating more awareness of the impact of configware engineering onto embedded system development and examines the requirements of overdue CSE curricula...
Reiner W. Hartenstein
WADS
2007
Springer
140views Algorithms» more  WADS 2007»
14 years 1 months ago
A Stab at Approximating Minimum Subadditive Join
Let (L, ∗) be a semilattice, and let c : L → [0, ∞) be monotone and increasing on L. We state the Minimum Join problem as: given size n sub-collection X of L and integer k w...
Staal A. Vinterbo