Sciweavers

1974 search results - page 311 / 395
» Conditional Purchase Orders
Sort
View
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 7 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
ISLPED
2010
ACM
181views Hardware» more  ISLPED 2010»
13 years 7 months ago
Exploiting power budgeting in thermal-aware dynamic placement for reconfigurable systems
 In this paper, a novel thermal-aware dynamic placement planner for reconfigurable systems is presented, which targets transient temperature reduction. Rather than solving time-...
Shahin Golshan, Eli Bozorgzadeh, Benjamin Carri&oa...
ISVC
2010
Springer
13 years 7 months ago
Acquisition Scenario Analysis for Face Recognition at a Distance
An experimental analysis of three acquisition scenarios for face recognition at a distance is reported, namely: close, medium, and far distance between camera and query face, the t...
Pedro Tome-Gonzalez, Julian Fiérrez-Aguilar...
JAIR
2010
82views more  JAIR 2010»
13 years 7 months ago
Non-Transferable Utility Coalitional Games via Mixed-Integer Linear Constraints
Coalitional games serve the purpose of modeling payoff distribution problems in scenarios where agents can collaborate by forming coalitions in order to obtain higher worths than...
Gianluigi Greco, Enrico Malizia, Luigi Palopoli, F...
JSAC
2010
142views more  JSAC 2010»
13 years 7 months ago
Cross-layer optimization for streaming scalable video over fading wireless networks
—We present a cross-layer design of transmitting scalable video streams from a base station to multiple clients over a shared fading wireless network by jointly considering the a...
Honghai Zhang, Yanyan Zheng, Mohammad A. Khojastep...