Sciweavers

231 search results - page 38 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
MOBISEC
2009
Springer
14 years 2 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
ICCV
2001
IEEE
14 years 9 months ago
Statistical Context Priming for Object Detection
There is general consensus that context can be a rich source of information about an object's identity, location and scale. However, the issue of how to formalize contextual ...
Antonio B. Torralba, Pawan Sinha
ICMCS
2006
IEEE
155views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Detecting Human Action in Active Video
We propose a novel scheme to detect human actions in active video. Active videos such as movies or sports broadcasting are taken purposively by “clever” photographers. They ar...
Hao Jiang, Ze-Nian Li, Mark S. Drew
IWCMC
2006
ACM
14 years 1 months ago
VANETCODE: network coding to enhance cooperative downloading in vehicular ad-hoc networks
Inter-vehicular communication is fast emerging as a popular application for mobile ad-hoc networks. Content distribution in Vehicular Ad-Hoc Networks (VANET) is particularly chall...
Shabbir Ahmed, Salil S. Kanhere
CCS
2008
ACM
13 years 9 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig