Sciweavers

1050 search results - page 3 / 210
» Two methods of authenticated positioning
Sort
View
IJCM
2002
84views more  IJCM 2002»
13 years 5 months ago
A Two-Stage Iterative Method for Solving a Weakly Nonlinear Parametrized System
In this paper we consider a parametrized system of weakly nonlinear equations which corresponds to a nonlinear elliptic boundary
Emanuele Galligani
TPHOL
2009
IEEE
14 years 11 hour ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
ICRA
1998
IEEE
100views Robotics» more  ICRA 1998»
13 years 9 months ago
Two Methods for Interpolating Rigid Body Motions
This paper investigates methods for computing a smooth motion that interpolates a given set of positions and orientations of a rigid body. To make the interpolation independent of...
Milos Zefran, Vijay Kumar
ECML
2003
Springer
13 years 10 months ago
A Two-Level Learning Method for Generalized Multi-instance Problems
In traditional multi-instance (MI) learning, a single positive instance in a bag produces a positive class label. Hence, the learner knows how the bag’s class label depends on th...
Nils Weidmann, Eibe Frank, Bernhard Pfahringer
JDCTA
2010
186views more  JDCTA 2010»
13 years 5 days ago
A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms
The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of net-work protocols. Energy consumption and network coverage are two important challe...
Mojtaba Romoozi, Hossein Ebrahimpour-Komleh