Sciweavers

29046 search results - page 5701 / 5810
» Computable Models
Sort
View
IPSN
2007
Springer
15 years 10 months ago
MeshEye: a hybrid-resolution smart camera mote for applications in distributed intelligent surveillance
Surveillance is one of the promising applications to which smart camera motes forming a vision-enabled network can add increasing levels of intelligence. We see a high degree of i...
Stephan Hengstler, Daniel Prashanth, Sufen Fong, H...
OTM
2007
Springer
15 years 10 months ago
A Multi-party Rational Exchange Protocol
In recent years, existing computing schemes and paradigms have evolved towards more flexible, ad-hoc scalable frameworks. Nowadays, exchanging interactions between entities often ...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
PET
2007
Springer
15 years 10 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis
SCALESPACE
2007
Springer
15 years 10 months ago
New Possibilities with Sobolev Active Contours
Recently, the Sobolev metric was introduced to define gradient flows of various geometric active contour energies. It was shown that the Sobolev metric out-performs the tradition...
Ganesh Sundaramoorthi, Anthony J. Yezzi, Andrea Me...
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 10 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
« Prev « First page 5701 / 5810 Last » Next »