Sciweavers

5275 search results - page 395 / 1055
» Computing by observing
Sort
View
ICC
2007
IEEE
131views Communications» more  ICC 2007»
15 years 11 months ago
Cooperative Resource Management in Cognitive Radio
Cognitive radio is generally understood as an intelligent wireless communication system aiming at the efficient utilization of radio resources. We argue for the extension of its sc...
Vuk Marojevic, Xavier Revés, Antoni Gelonch
ICRA
2007
IEEE
122views Robotics» more  ICRA 2007»
15 years 11 months ago
Exploiting the Information at the Loop Closure in SLAM
— This paper presents two methods able to exploit the information at the loop closure in the SLAM problem. Both methods have three fundamental advantages. The first one is that ...
Agostino Martinelli, Roland Siegwart
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
16 years 5 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
UIC
2009
Springer
15 years 11 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
CGF
2008
144views more  CGF 2008»
15 years 5 months ago
Global Intrinsic Symmetries of Shapes
Although considerable attention in recent years has been given to the problem of symmetry detection in general shapes, few methods have been developed that aim to detect and quant...
Maks Ovsjanikov, Jian Sun, Leonidas J. Guibas