Sciweavers

870 search results - page 100 / 174
» Constructions for Difference Triangle Sets
Sort
View
ICISC
2008
89views Cryptology» more  ICISC 2008»
13 years 9 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
SPLC
2008
13 years 9 months ago
Building a Family of Compilers
We have developed and maintained a set of closely related compilers. Although much of their code is duplicated and shared, they have been maintained separately because they are tr...
Wonseok Chae, Matthias Blume
ICAI
2004
13 years 9 months ago
Coordinating Autonomous Planners
We present a framework for coordinating autonomous planning agents. Together, these agents have to achieve a set of interdependent (elementary) tasks. Each of the agents receives a...
Adriaan ter Mors, Jeroen Valk, Cees Witteveen
AAAI
1996
13 years 9 months ago
Spatial Aggregation: Language and Applications
This paper describes the spatial aggregation language and its applications. Spatial aggregation comprises a framework and a mechanism for organizing computations around image-like...
Christopher Bailey-Kellogg, Feng Zhao, Kenneth Yip
ICASSP
2010
IEEE
13 years 8 months ago
Multi-View Object Detection by Classifier Interpolation
In this paper, we propose a novel solution for multi-view object detection. Given a set of training examples at different views, we select examples at a few key views and train on...
Xiaobai Liu, Haifeng Gong, Shuicheng Yan, Hai Jin