Sciweavers

314 search results - page 27 / 63
» Cubical token systems
Sort
View
IMECS
2007
15 years 1 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 4 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
DC
2007
14 years 11 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
103
Voted
ICRA
2002
IEEE
125views Robotics» more  ICRA 2002»
15 years 4 months ago
Natural Landmark Based Localisation System using Panoramic Images
A panoramic image based localisation system has been implemented on a B21r mobile robot and tested in a heavily cluttered environment. It takes vertical object edges as natural la...
David C. K. Yuen, Bruce A. MacDonald
CEAS
2004
Springer
15 years 5 months ago
SpamGuru: An Enterprise Anti-Spam Filtering System
Spam-reduction techniques have developed rapidly over the last few years, as spam volumes have increased. We believe that no one anti-spam solution is the “right” answer, and t...
Richard Segal, Jason Crawford, Jeffrey O. Kephart,...