Sciweavers

3305 search results - page 190 / 661
» Models and Modeling Infrastructures for Global Computational...
Sort
View
132
Voted
SUTC
2008
IEEE
15 years 10 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
132
Voted
MOBIHOC
2000
ACM
15 years 8 months ago
Utility-based decision-making in wireless sensor networks
— We consider challenges associated with application domains in which a large number of distributed, networked sensors must perform a sensing task repeatedly over time. We addres...
John W. Byers, Gabriel Nasser
137
Voted
FOCS
2010
IEEE
15 years 1 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
236
Voted
ECCV
2006
Springer
16 years 5 months ago
Figure/Ground Assignment in Natural Images
Abstract. Figure/ground assignment is a key step in perceptual organization which assigns contours to one of the two abutting regions, providing information about occlusion and all...
Xiaofeng Ren, Charless Fowlkes, Jitendra Malik
184
Voted
ECCV
2010
Springer
15 years 4 months ago
Piecewise Quadratic Reconstruction of Non-Rigid Surfaces from Monocular Sequences
Abstract. In this paper we present a new method for the 3D reconstruction of highly deforming surfaces (for instance a flag waving in the wind) viewed by a single orthographic came...
João Fayad, Lourdes de Agapito, Alessio Del...