Sciweavers

616 search results - page 99 / 124
» Decoding One Out of Many
Sort
View
JUCS
2008
149views more  JUCS 2008»
13 years 8 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
PR
2006
154views more  PR 2006»
13 years 8 months ago
A fuzzy logic approach for detection of video shot boundaries
Video temporal segmentation is normally the first and important step for content-based video applications. Many features including the pixel difference, colour histogram, motion, ...
Hui Fang, Jianmin Jiang, Yue Feng
SYNTHESE
2008
99views more  SYNTHESE 2008»
13 years 8 months ago
Gavagai again
Quine (1960, ch.2) claims that there are a variety of equally good schemes for translating or interpreting ordinary talk. `Rabbit' might be taken to divide its reference over...
John Robert Gareth Williams
TCBB
2008
137views more  TCBB 2008»
13 years 8 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
CCR
2005
129views more  CCR 2005»
13 years 8 months ago
The problem of synthetically generating IP traffic matrices: initial recommendations
There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
Antonio Nucci, Ashwin Sridharan, Nina Taft