Sciweavers

1116 search results - page 120 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ENTCS
2002
78views more  ENTCS 2002»
13 years 7 months ago
Towards ANSI C Program Slicing using XML
In this paper, we consider ANSI C program slicing using XML (Extensible Markup Language). Our goal is to build a flexible, useful and uniform data interchange format for CASE tool...
Katsuhiko Gondow, Hayato Kawashima
FC
2009
Springer
99views Cryptology» more  FC 2009»
14 years 2 months ago
Optical DNA
Abstract. A certificate of authenticity (COA) is an inexpensive physical object with a random and unique structure S which is hard to nearexactly replicate. An inexpensive device ...
Deepak Vijaywargi, Dave Lewis, Darko Kirovski
ADHOC
2007
133views more  ADHOC 2007»
13 years 8 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
CVIU
2010
163views more  CVIU 2010»
13 years 8 months ago
Automated handwashing assistance for persons with dementia using video and a partially observable Markov decision process
This paper presents a real-time vision-based system to assist a person with dementia wash their hands. The system uses only video inputs, and assistance is given as either verbal ...
Jesse Hoey, Pascal Poupart, Axel von Bertoldi, Tam...
ACL
2012
11 years 10 months ago
SITS: A Hierarchical Nonparametric Model using Speaker Identity for Topic Segmentation in Multiparty Conversations
One of the key tasks for analyzing conversational data is segmenting it into coherent topic segments. However, most models of topic segmentation ignore the social aspect of conver...
Viet-An Nguyen, Jordan L. Boyd-Graber, Philip Resn...