Sciweavers

313 search results - page 50 / 63
» Preprocessors from an Abstract Point of View
Sort
View
IJWIS
2006
126views more  IJWIS 2006»
13 years 7 months ago
Web services on embedded devices
Abstract-- The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. F...
Daniel Schall, Marco Aiello, Schahram Dustdar
JCST
2008
102views more  JCST 2008»
13 years 7 months ago
Random and Periodic Sleep Schedules for Target Detection in Sensor Networks
Abstract--We study Random and Periodic sleep schedules from the point of view of delay in detecting the target. We consider sleep schedules in which a sensor in `inactive' mod...
Vaishali P. Sadaphal, Bijendra N. Jain
JOC
2006
116views more  JOC 2006»
13 years 7 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
PAA
2008
13 years 7 months ago
Human action recognition in videos based on the Transferable Belief Model
Abstract This paper focuses on human behavior recognition where the main problem is to bridge the semantic gap between the analogue observations of the real world and the symbolic ...
Emmanuel Ramasso, Costas Panagiotakis, Denis Pelle...
IANDC
2007
151views more  IANDC 2007»
13 years 7 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke