Sciweavers

2028 search results - page 297 / 406
» Deriving Relation Keys from XML Keys
Sort
View
SIGECOM
2006
ACM
107views ECommerce» more  SIGECOM 2006»
15 years 10 months ago
Empirical mechanism design: methods, with application to a supply-chain scenario
Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with ...
Yevgeniy Vorobeychik, Christopher Kiekintveld, Mic...
AMFG
2005
IEEE
155views Biometrics» more  AMFG 2005»
15 years 10 months ago
Linear Programming for Matching in Human Body Gesture Recognition
We present a novel human body gesture recognition method using a linear programming based matching scheme. Instead of attempting to segment an object from the background, we develo...
Hao Jiang, Ze-Nian Li, Mark S. Drew
CSFW
2005
IEEE
15 years 10 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ICMCS
2005
IEEE
136views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Human Posture Recognition with Convex Programming
We present a novel human posture recognition method using convex programming based matching schemes. Instead of trying to segment the object from the background, we develop a nove...
Hao Jiang, Ze-Nian Li, Mark S. Drew
INFOCOM
2005
IEEE
15 years 10 months ago
Farsighted users harness network time-diversity
Abstract— Fluctuations in network conditions are a common phenomenon. They arise in the current wired Internet due to changes in demand, and in wireless networks due to changing ...
Peter B. Key, Laurent Massoulié, Milan Vojn...