Sciweavers

1728 search results - page 183 / 346
» Self-Organisation: Paradigms and Applications
Sort
View
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
13 years 12 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
COLCOM
2008
IEEE
13 years 12 months ago
Towards Continuous Workflow Enactment Systems
Abstract. Traditional workflow enactment systems and workflow design processes view the workflow as a one-time interaction with the various data sources, executing a series of step...
Panayiotis Neophytou, Panos K. Chrysanthis, Alexan...
EURONGI
2008
Springer
13 years 12 months ago
Image Recognition Traffic Patterns for Wireless Multimedia Sensor Networks
The objective of this work is to identify some of the traffic characteristics of Wireless Multimedia Sensor Networks (WMSN). Applications such as video surveillance sensor networks...
Ruken Zilan, José M. Barceló-Ordinas...
CIDR
2007
155views Algorithms» more  CIDR 2007»
13 years 11 months ago
Object-level Vertical Search
Current web search engines essentially conduct document-level ranking and retrieval. However, structured information about realworld objects embedded in static webpages and online...
Zaiqing Nie, Ji-Rong Wen, Wei-Ying Ma
COLING
2008
13 years 11 months ago
The Power of Negative Thinking: Exploiting Label Disagreement in the Min-cut Classification Framework
Treating classification as seeking minimum cuts in the appropriate graph has proven effective in a number of applications. The power of this approach lies in its ability to incorp...
Mohit Bansal, Claire Cardie, Lillian Lee