Sciweavers

1729 search results - page 344 / 346
» Generic Haskell: Applications
Sort
View
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 5 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
ICEGOV
2009
ACM
13 years 5 months ago
A web-based performance monitoring system for e-government services
An e-Government portal represents not only a reputable public image of the sovereignty of a region, it is responsible for serving many users from local citizens and beyond, in a r...
Simon Fong, Ho Si Meng
ICMCS
2009
IEEE
199views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Association rule mining in multiple, multidimensional time series medical data
Time series pattern mining (TSPM) finds correlations or dependencies in same series or in multiple time series. When the numerous instances of multiple time series data are associ...
Gaurav N. Pradhan, B. Prabhakaran
CVPR
2011
IEEE
13 years 3 months ago
Real Time Head Pose Estimation with Random Regression Forests
Fast and reliable algorithms for estimating the head pose are essential for many applications and higher-level face analysis tasks. We address the problem of head pose estimation ...
Gabriele Fanelli, Juergen Gall, Luc VanGool
TKDE
2011
168views more  TKDE 2011»
13 years 2 months ago
On Computing Farthest Dominated Locations
—In reality, spatial objects (e.g., hotels) not only have spatial locations but also have quality attributes (e.g., price, star). An object p is said to dominate another one p , ...
Hua Lu, Man Lung Yiu