Sciweavers

5615 search results - page 1045 / 1123
» Active Learner Modelling
Sort
View
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
143
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
136
Voted
ERSHOV
2009
Springer
15 years 10 months ago
Towards a Scalable, Pragmatic Knowledge Representation Language for the Web
Abstract. A basic cornerstone of the Semantic Web are formal languages for describing resources in a clear and unambiguous way. Logical underpinnings facilitate automated reasoning...
Florian Fischer, Gulay Ünel, Barry Bishop, Di...
151
Voted
DSRT
2008
IEEE
15 years 9 months ago
Simulation Driven Experiment Control in Driver Assistance Assessment
Embedded systems technologies and advances in micro electronics have accelerated the evolution of driver assistance systems towards more driving safety, comfort, entertainment and...
Andreas Riener, Alois Ferscha
ICRA
2008
IEEE
471views Robotics» more  ICRA 2008»
15 years 9 months ago
Autonomous image-based exploration for mobile robot navigation
— Image-based navigation paradigms have recently emerged as an interesting alternative to conventional modelbased methods in mobile robotics. In this paper, we augment the existi...
D. Santosh, Supreeth Achar, C. V. Jawahar
« Prev « First page 1045 / 1123 Last » Next »