Sciweavers

1059 search results - page 210 / 212
» Improved Algorithms via Approximations of Probability Distri...
Sort
View
WPES
2003
ACM
14 years 24 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
BTW
2007
Springer
236views Database» more  BTW 2007»
13 years 11 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
TMC
2010
138views more  TMC 2010»
13 years 5 months ago
Reliable Anchor-Based Sensor Localization in Irregular Areas
—Localization is a fundamental problem in wireless sensor networks and its accuracy impacts the efficiency of location-aware protocols and applications, such as routing and stora...
Bin Xiao, Lin Chen, Qingjun Xiao, Minglu Li
ATAL
2007
Springer
14 years 1 months ago
Meta-level coordination for solving negotiation chains in semi-cooperative multi-agent systems
A negotiation chain is formed when multiple related negotiations are spread over multiple agents. In order to appropriately order and structure the negotiations occurring in the c...
Xiaoqin Zhang, Victor R. Lesser
NETGAMES
2004
ACM
14 years 29 days ago
Lightweight QoS-support for networked mobile gaming
In this paper, we present an approach to provide Quality of Service (QoS) for networked mobile gaming. In order to examine the QoS requirements of mobile games, we ported a simple...
Marcel Busse, Bernd Lamparter, Martin Mauve, Wolfg...