Sciweavers

2927 search results - page 86 / 586
» Secure Distributed Human Computation
Sort
View
PERVASIVE
2007
Springer
13 years 8 months ago
Mobiscopes for Human Spaces
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Tarek F. Abdelzaher, Yaw Anokwa, Péter Boda...
ECOOPW
2006
Springer
14 years 27 days ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
ICDCS
2002
IEEE
14 years 2 months ago
Key Trees and the Security of Interval Multicast
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper, we describe how any user in the group can use the different keys i...
Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy
ECCV
2010
Springer
14 years 2 months ago
2D Action Recognition Serves 3D Human Pose Estimation
3D human pose estimation in multi-view settings benefits from embeddings of human actions in low-dimensional manifolds, but the complexity of the embeddings increases with the num...
ICDCS
1997
IEEE
14 years 1 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh