Sciweavers

34202 search results - page 6763 / 6841
» The Tera computer system
Sort
View
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
14 years 22 days ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
ETFA
2006
IEEE
14 years 21 days ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
FGR
2006
IEEE
121views Biometrics» more  FGR 2006»
14 years 20 days ago
Optimal Hand Gesture Vocabulary Design Using Psycho-Physiological and Technical Factors
A global approach to hand gesture vocabulary design is proposed which includes human as well as technical design factors. The human centered desires of multiple users are implicit...
Helman Stern, Juan P. Wachs, Yael Edan
AC
2003
Springer
14 years 20 days ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...
ATAL
2003
Springer
14 years 20 days ago
A false-name-proof double auction protocol for arbitrary evaluation values
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategyproofness...
Yuko Sakurai, Makoto Yokoo
« Prev « First page 6763 / 6841 Last » Next »