Sciweavers

2250 search results - page 428 / 450
» Authorizing applications in singularity
Sort
View
85
Voted
ICASSP
2010
IEEE
14 years 10 months ago
Hiding information inside structured shapes
This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
Samarjit Das, Shantanu Rane, Anthony Vetro
HUC
2010
Springer
14 years 9 months ago
ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home
This paper presents ElectriSense, a new solution for automatically detecting and classifying the use of electronic devices in a home from a single point of sensing. ElectriSense r...
Sidhant Gupta, Matthew S. Reynolds, Shwetak N. Pat...
AES
2008
Springer
133views Cryptology» more  AES 2008»
14 years 9 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar
88
Voted
AMAI
2008
Springer
14 years 9 months ago
Set based logic programming
In a previous paper [BMR01], the authors showed that the mechanism underlying Logic Programming can be extended to handle the situation where the atoms are interpreted as subsets o...
Howard A. Blair, Victor W. Marek, Jeffrey B. Remme...
71
Voted
AMAI
2008
Springer
14 years 9 months ago
Distributed boundary coverage with a team of networked miniature robots using a robust market-based algorithm
We study distributed boundary coverage of known environments using a team of miniature robots. Distributed boundary coverage is an instance of the multi-robot task-allocation prob...
Patrick Amstutz, Nikolaus Correll, Alcherio Martin...