Sciweavers

16160 search results - page 3157 / 3232
» How to approach humans
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 7 hour ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ECCV
2010
Springer
14 years 5 hour ago
Accurate Image Localization Based on Google Maps Street View
Abstract. Finding an image’s exact GPS location is a challenging computer vision problem that has many real-world applications. In this paper, we address the problem of finding ...
PERCOM
2010
ACM
13 years 12 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...
ESWS
2007
Springer
13 years 12 months ago
Imprecise SPARQL: Towards a Unified Framework for Similarity-Based Semantic Web Tasks
This proposal explores a unified framework to solve Semantic Web tasks that often require similarity measures, such as RDF retrieval, ontology alignment, and semantic service match...
Christoph Kiefer
EUROCRYPT
2007
Springer
13 years 12 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
« Prev « First page 3157 / 3232 Last » Next »