Sciweavers

182 search results - page 7 / 37
» Identity the Civic Scenario
Sort
View
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
12 years 24 days ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor
ECCV
2006
Springer
15 years 7 days ago
Tracking and Labelling of Interacting Multiple Targets
Abstract. Successful multi-target tracking requires solving two problems - localize the targets and label their identity. An isolated target's identity can be unambiguously pr...
Josephine Sullivan, Stefan Carlsson
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
12 years 23 days ago
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Abstract. In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the id...
Nelly Fazio, Irippuge Milinda Perera
INFOCOM
2011
IEEE
13 years 1 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
CDC
2010
IEEE
105views Control Systems» more  CDC 2010»
13 years 5 months ago
Weakly pulse-coupled oscillators: Heterogeneous delays lead to homogeneous phase
This paper studies the effect of heterogenous delays in networks of weakly pulse-coupled identical oscillators. We develop a new framework to study them by constructing a non-delay...
Enrique Mallada, Ao Tang