Sciweavers

849 search results - page 137 / 170
» Completely Non-malleable Schemes
Sort
View
FLOPS
2008
Springer
13 years 10 months ago
Formalizing a Constraint Deductive Database Language Based on Hereditary Harrop Formulas with Negation
In this paper, we present an extension of the scheme HH(C) (Hereditary Harrop formulas with Constraints) with a suitable formulation of negation in order to obtain a constraint ded...
Susana Nieva, Jaime Sánchez-Hernánde...
DICTA
2007
13 years 10 months ago
Tracking with Multiple Cameras for Video Surveillance
The large shape variability and partial occlusions challenge most object detection and tracking methods for nonrigid targets such as pedestrians. Single camera tracking is limited...
Manas Kamal Bhuyan, Brian C. Lovell, Abbas Bigdeli
LREC
2010
219views Education» more  LREC 2010»
13 years 10 months ago
The GIVE-2 Corpus of Giving Instructions in Virtual Environments
We present the GIVE-2 Corpus, a new corpus of human instruction giving. The corpus was collected by asking one person in each pair of subjects to guide the other person towards co...
Andrew Gargett, Konstantina Garoufi, Alexander Kol...
SEC
2008
13 years 10 months ago
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators
In an on-line transaction, a user sends her personal sensitive data (e.g., password) to a server for authentication. This process is known as Single Sign-On (SSO). Subject to phish...
Yongdong Wu, Haixia Yao, Feng Bao
DAGSTUHL
2006
13 years 10 months ago
Decentralization and Mechanism Design for Online Machine Scheduling
We study the online version of the classical parallel machine scheduling problem to minimize the total weighted completion time from a new perspective: We assume that the data of ...
Birgit Heydenreich, Rudolf Müller, Marc Uetz