Sciweavers

CHES
2004
Springer
167views Cryptology» more  CHES 2004»
13 years 10 months ago
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement a...
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eb...
FC
2005
Springer
98views Cryptology» more  FC 2005»
13 years 10 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
SIBGRAPI
2005
IEEE
13 years 10 months ago
Component-Based Adaptive Sampling
High-fidelity renderings of virtual environments is a notoriously computationally expensive task. One commonly used method to alleviate the costs is to adaptively sample the rend...
Kurt Debattista, Alan Chalmers
ICRA
2006
IEEE
99views Robotics» more  ICRA 2006»
13 years 10 months ago
Bayesian Estimation for Autonomous Object Manipulation based on Tactile Sensors
Abstract— We consider the problem of autonomously estimating position and orientation of an object from tactile data. When initial uncertainty is high, estimation of all six para...
Anna Petrovskaya, Oussama Khatib, Sebastian Thrun,...
GEOS
2007
Springer
13 years 10 months ago
Applying Spatial Reasoning to Topographical Data with a Grounded Geographical Ontology
Abstract. Grounding an ontology upon geographical data has been proposed as a method of handling the vagueness in the domain more effectively. In order to do this, we require meth...
David Mallenby, Brandon Bennett