Sciweavers

7544 search results - page 1503 / 1509
» Network Forensics Analysis
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
VRST
2010
ACM
13 years 5 months ago
Region-of-interest volumetric visual hull refinement
This paper introduces a region-of-interest visual hull refinement technique, based on flexible voxel grids for volumetric visual hull reconstructions. Region-of-interest refinemen...
Daniel Knoblauch, Falko Kuester
WEBI
2010
Springer
13 years 5 months ago
An Approach to Model and Predict the Popularity of Online Contents with Explanatory Factors
In this paper, we propose a methodology to predict the popularity of online contents. More precisely, rather than trying to infer the popularity of a content itself, we infer the l...
Jong Gun Lee, Sue Moon, Kavé Salamatian
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 5 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
AIEDU
2010
13 years 5 months ago
Supporting Collaborative Learning and E-Discussions Using Artificial Intelligence Techniques
An emerging trend in classrooms is the use of networked visual argumentation tools that allow students to discuss, debate, and argue with one another in a synchronous fashion about...
Bruce M. McLaren, Oliver Scheuer, Jan Miksatko
« Prev « First page 1503 / 1509 Last » Next »