Sciweavers

2714 search results - page 385 / 543
» Under the table interaction
Sort
View
FC
2007
Springer
118views Cryptology» more  FC 2007»
15 years 10 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
FMCO
2007
Springer
118views Formal Methods» more  FMCO 2007»
15 years 10 months ago
Coordination: Reo, Nets, and Logic
This article considers the coordination language Reo, a Petri net variant called zero-safe nets, and intuitionistic temporal linear logic (ITLL). The first part examines the seman...
Dave Clarke
108
Voted
HPCC
2007
Springer
15 years 10 months ago
Towards Scalable Event Tracing for High End Systems
Although event tracing of parallel applications offers highly detailed performance information, tracing on current leading edge systems may lead to unacceptable perturbation of the...
Kathryn Mohror, Karen L. Karavanic
HUC
2007
Springer
15 years 10 months ago
A Long-Term Evaluation of Sensing Modalities for Activity Recognition
We study activity recognition using 104 hours of annotated data collected from a person living in an instrumented home. The home contained over 900 sensor inputs, including wired r...
Beth Logan, Jennifer Healey, Matthai Philipose, Em...
ISI
2007
Springer
15 years 10 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng