Sciweavers

1116 search results - page 139 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
EUROIMSA
2006
116views Multimedia» more  EUROIMSA 2006»
13 years 9 months ago
Guidelines for Selecting Practical MPEG Group of Pictures
The repeated pattern of I, P and B frames in an MPEG stream is known as the Group of Pictures (GOP). Current GOP choices are made using intuition and informal guidelines without t...
Huahui Wu, Mark Claypool, Robert E. Kinicki
TWC
2010
13 years 2 months ago
Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination
Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semistatic interf...
Mahmudur Rahman, Halim Yanikomeroglu
FC
2006
Springer
129views Cryptology» more  FC 2006»
13 years 11 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
AI
2002
Springer
13 years 7 months ago
Using similarity criteria to make issue trade-offs in automated negotiations
Automated negotiation is a key form of interaction in systems that are composed of multiple autonomous agents. The aim of such interactions is to reach agreements through an itera...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...
PRL
2008
198views more  PRL 2008»
13 years 7 months ago
Pose estimation and tracking using multivariate regression
This paper presents an extension of the relevance vector machine (RVM) algorithm to multivariate regression. This allows the application to the task of estimating the pose of an a...
Arasanathan Thayananthan, Ramanan Navaratnam, Bj&o...