Sciweavers

2458 search results - page 389 / 492
» Database-Management Principles And Applications
Sort
View
ATAL
2007
Springer
15 years 4 months ago
Locating RF emitters with large UAV teams
This chapter describes a principled, yet computationally efficient way for a team of UAVs with Received Signal Strength Indicator (RSSI) sensors to locate radio frequency emitting...
Paul Scerri, Robin Glinton, Sean Owens, Steven Oka...
ATAL
2007
Springer
15 years 4 months ago
An adversarial environment model for bounded rational agents in zero-sum interactions
Multiagent environments are often not cooperative nor collaborative; in many cases, agents have conflicting interests, leading to adversarial interactions. This paper presents a ...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
CIVR
2007
Springer
15 years 4 months ago
Comparison of face matching techniques under pose variation
The ability to match faces in video is a crucial component for many multimedia applications such as searching and recognizing people in semantic video browsing, surveillance and h...
Bart Kroon, Alan Hanjalic, Sabri Boughorbel
ESORICS
2007
Springer
15 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
FSKD
2007
Springer
140views Fuzzy Logic» more  FSKD 2007»
15 years 4 months ago
QoS-Aware Web Service Selection by a Synthetic Weight
The selection of web services according to different quality of service (QoS) is one of the most important decision issues for which complex considerations are involved. In many c...
PengCheng Xiong, Yushun Fan