Sciweavers

811 search results - page 103 / 163
» Flow Theory: An Enhancement
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
ICVS
1999
Springer
14 years 1 months ago
Improving 3D Active Visual Tracking
Tracking in 3D with an active vision system depends on the performance of both motor control and vision algorithms. Tracking is performed based on different visual behaviors, name...
João P. Barreto, Paulo Peixoto, Jorge Batis...
MM
1993
ACM
122views Multimedia» more  MM 1993»
14 years 24 days ago
Synchronization Models for Multimedia Presentation with User Participation
This paper addresses the key issue of providing flexible multimedia presentation with user participation and suggests synchronization models which can specify the user participat...
B. Prabhakaran, S. V. Raghavan
ATAL
2010
Springer
13 years 9 months ago
Monotone cooperative games and their threshold versions
Cooperative games provide an appropriate framework for fair and stable resource allocation in multiagent systems. This paper focusses on monotone cooperative games, a class which ...
Haris Aziz, Felix Brandt, Paul Harrenstein
ICIP
2002
IEEE
14 years 10 months ago
Error resilience property of multihypothesis motion-compensated prediction
Abstract - Multihypothesis motion-compensated prediction (MHMCP) approach has shown significant gain in terms of coding efficiency both in theory and practice. However, the fact th...
Shunan Lin, Yao Wang