Sciweavers

3296 search results - page 596 / 660
» Gathercast with Active Networks
Sort
View
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 4 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
CCGRID
2002
IEEE
14 years 3 months ago
Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella
Peer-to-peer computing and networking, an emerging model of communication and computation, has recently started to gain significant acceptance. This model not only enables client...
Evangelos P. Markatos
HAPTICS
2002
IEEE
14 years 3 months ago
Building a Task Language for Segmentation and Recognition of User Input to Cooperative Manipulation Systems
We present the results of using Hidden Markov Models (HMMs) for automatic segmentation and recognition of user motions. Previous work on recognition of user intent with man/machin...
C. Sean Hundtofte, Gregory D. Hager, Allison M. Ok...
ICNP
2002
IEEE
14 years 3 months ago
An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II
— This paper describes a novel, ultra-fast heuristic algorithm to address an NP-hard optimization problem. One of its significances is that, for the first time, the paper shows...
Dahai Xu, Chunming Qiao, Yizhi Xiong
ISNN
2010
Springer
14 years 3 months ago
Multiattribute Bayesian Preference Elicitation with Pairwise Comparison Queries
Preference elicitation (PE) is an important component of interactive decision support systems that aim to make optimal recommendations to users by actively querying their preferen...
Shengbo Guo, Scott Sanner