Sciweavers

1050 search results - page 4 / 210
» Two methods of authenticated positioning
Sort
View
ITRUST
2004
Springer
13 years 11 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 5 days ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar
ICPR
2006
IEEE
14 years 7 months ago
Vehicle Lateral Position Estimation Method Based on Matching of Top-View Images
In this paper, a method to estimate the lateral position of the vehicle from a sequence of moving camera images is proposed. Proposed method relies on the plane projective transfo...
Tomoaki Teshima, Hideo Saito, Shinji Ozawa, Keiich...
BMCBI
2008
108views more  BMCBI 2008»
13 years 6 months ago
Empirical methods for controlling false positives and estimating confidence in ChIP-Seq peaks
Background: High throughput signature sequencing holds many promises, one of which is the ready identification of in vivo transcription factor binding sites, histone modifications...
David A. Nix, Samir J. Courdy, Kenneth M. Boucher
PCM
2007
Springer
160views Multimedia» more  PCM 2007»
13 years 12 months ago
3D Tracking of a Soccer Ball Using Two Synchronized Cameras
Abstract. We propose an adaptive method that can estimate 3D position of a soccer ball by using two viewpoint videos. The 3D position of a ball is essential to realize a 3D free vi...
Norihiro Ishii, Itaru Kitahara, Yoshinari Kameda, ...