Sciweavers

610 search results - page 86 / 122
» Predicate-Based Key Exchange
Sort
View
ICIAP
2009
ACM
14 years 8 months ago
Pathnodes Integration of Standalone Particle Filters for People Tracking on Distributed Surveillance Systems
In this paper, we present a new approach to object tracking based on batteries of particle filter working in multicamera systems with non overlapped fields of view. In each view th...
Roberto Vezzani, Davide Baltieri, Rita Cucchiara
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
14 years 7 months ago
Non-interactive and reusable non-malleable commitment schemes
We consider non-malleable (NM) and universally composable (UC) commitment schemes in the common reference string (CRS) model. We show how to construct non-interactive NM commitmen...
Ivan Damgård, Jens Groth
VLDB
2001
ACM
126views Database» more  VLDB 2001»
14 years 7 months ago
XML-enabled workflow management for e-services across heterogeneous platforms
Advanced e-services require efficient, flexible, and easy-to-use workflow technology that integrates well with mainstream Internet technologies like XML and Web servers. This pape...
German Shegalov, Michael Gillmann, Gerhard Weikum
SIGMOD
2002
ACM
196views Database» more  SIGMOD 2002»
14 years 7 months ago
Storing and querying ordered XML using a relational database system
XML is quickly becoming the de facto standard for data exchange over the Internet. This is creating a new set of data management requirements involving XML, such as the need to st...
Igor Tatarinov, Stratis Viglas, Kevin S. Beyer, Ja...
DCC
2001
IEEE
14 years 7 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler