Sciweavers

3299 search results - page 575 / 660
» Privacy and Trusted Computing
Sort
View
CLOR
2006
14 years 1 months ago
An Implicit Shape Model for Combined Object Categorization and Segmentation
We present a method for object categorization in real-world scenes. Following a common consensus in the field, we do not assume that a figure-ground segmentation is available prior...
Bastian Leibe, Ales Leonardis, Bernt Schiele
PERVASIVE
2010
Springer
14 years 1 months ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
COORDINATION
2008
Springer
14 years 27 days ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
14 years 19 days ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 11 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...