Sciweavers

1513 search results - page 297 / 303
» Cryptographic Pattern Matching
Sort
View
JSAC
2008
111views more  JSAC 2008»
13 years 7 months ago
Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks
Abstract--Applications involving the dissemination of information directly relevant to humans (e.g., service advertising, news spreading, environmental alerts) often rely on publis...
Paolo Costa, Cecilia Mascolo, Mirco Musolesi, Gian...
JUCS
2008
166views more  JUCS 2008»
13 years 7 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
EOR
2007
198views more  EOR 2007»
13 years 7 months ago
Airline crew scheduling from planning to operations
Crew scheduling problems at the planning level are typically solved in two steps: first, creating working patterns, and then assigning these to individual crew. The first step is ...
Claude P. Medard, Nidhi Sawhney
PR
2008
159views more  PR 2008»
13 years 7 months ago
A two-stage head pose estimation framework and evaluation
Head pose is an important indicator of a person's focus of attention. Also, head pose estimation can be used as the front-end analysis for multi-view face analysis. For examp...
Junwen Wu, Mohan M. Trivedi
PAMI
2006
186views more  PAMI 2006»
13 years 7 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...