Sciweavers

35419 search results - page 178 / 7084
» How are we doing
Sort
View
SP
2002
IEEE
143views Security Privacy» more  SP 2002»
15 years 3 months ago
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
In this paper, we introduce a new class of side
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, S...
180
Voted
COST
2009
Springer
185views Multimedia» more  COST 2009»
15 years 2 months ago
How an Agent Can Detect and Use Synchrony Parameter of Its Own Interaction with a Human?
Synchrony is claimed by psychology as a crucial parameter of any social interaction: to give to human a feeling of natural interaction, a feeling of agency [17], an agent must be a...
Ken Prepin, Philippe Gaussier
CVPR
2011
IEEE
14 years 8 months ago
How does Person Identity Recognition Help Multi-Person Tracking?
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Cheng-Hao Kuo, Ram Nevatia
ICDT
2009
ACM
125views Database» more  ICDT 2009»
16 years 5 months ago
How big must complete XML query languages be?
Marx and de Rijke have shown that the navigational core of the w3c XML query language XPath is not first-order complete ? that is it cannot express every query definable in firsto...
Clemens Ley, Michael Benedikt
APSEC
2003
IEEE
15 years 9 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun