Sciweavers

269 search results - page 37 / 54
» Who Thinks Who Knows Who
Sort
View
ISSA
2004
13 years 8 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
MASCOTS
2004
13 years 8 months ago
Reliable Response Delivery in Peer-to-Peer Systems
Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query m...
Xiaomei Liu, Yunhao Liu, Li Xiao
SEC
2001
13 years 8 months ago
Communication-Efficient Group Key Agreement
Abstract Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic operations, and minimizing the communication overh...
Yongdae Kim, Adrian Perrig, Gene Tsudik
BMVC
2000
13 years 8 months ago
A New Easy Camera Calibration Technique Based on Circular Points
Inspired by Zhang's work, a new easy technique for calibrating a camera based on circular points is proposed. The proposed technique only requires the camera to observe a new...
Xiaoqiao Meng, Hua Li, Zhanyi Hu
MM
2010
ACM
146views Multimedia» more  MM 2010»
13 years 7 months ago
The idiap wolf corpus: exploring group behaviour in a competitive role-playing game
In this paper we present the Idiap Wolf Database. This is a audio-visual corpus containing natural conversational data of volunteers who took part in a competitive role-playing ga...
Hayley Hung, Gokul Chittaranjan