Sciweavers

858 search results - page 41 / 172
» One Is Enough!
Sort
View
SODA
2008
ACM
112views Algorithms» more  SODA 2008»
13 years 10 months ago
The effect of induced subgraphs on quasi-randomness
One of the main questions that arise when studying random and quasi-random structures is which properties P are such that any object that satisfies P "behaves" like a tr...
Asaf Shapira, Raphael Yuster
IADIS
2003
13 years 10 months ago
Preparing Students for Effective Workplace Collaboration
Collaboration in the workplace is essential if one is to work effectively. Highly developed interpersonal skills facilitate collaboration, but, as lecturers, we are being encourag...
Mae McSporran, Caroline King
EUROCRYPT
2000
Springer
14 years 14 days ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway
AMI
2009
Springer
14 years 3 months ago
Behavior Analysis Based on Coordinates of Body Tags
This paper describes fall detection, activity recognition and the detection of anomalous gait in the Confidence project. The project aims to prolong the independence of the elderly...
Mitja Lustrek, Bostjan Kaluza, Erik Dovgan, Bogdan...
ICWE
2009
Springer
14 years 3 months ago
Personal News RSS Feeds Generation Using Existing News Feeds
Nowadays more and more news sites publish news stories using news RSS feeds for easier access and subscription on the Web. Generally, news stories are grouped by several categories...
Bin Liu, Hao Han, Tomoya Noro, Takehiro Tokuda