Sciweavers

1610 search results - page 86 / 322
» Identity Based Multisignatures
Sort
View
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 8 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
ESAW
2009
Springer
15 years 8 months ago
Knowledge Management in Role Based Agents
In multi-agent system literature, the role concept is getting ngly researched to provide an abstraction to scope beliefs, norms, goals of agents and to shape relationships of the a...
Hüseyin Kir, Erdem Eser Ekinci, Oguz Dikenell...
ICVS
2009
Springer
15 years 8 months ago
Open-Set Face Recognition-Based Visitor Interface System
This work presents a real-world, real-time video-based open-set face recognition system. The system has been developed as a visitor interface, where a visitor looks at the monitor ...
Hazim Kemal Ekenel, Lorant Szasz-Toth, Rainer Stie...
ICRA
2007
IEEE
165views Robotics» more  ICRA 2007»
15 years 8 months ago
Probabilistic Appearance Based Navigation and Loop Closing
— This paper describes a probabilistic framework for navigation using only appearance data. By learning a generative model of appearance, we can compute not only the similarity o...
Mark Cummins, Paul M. Newman
AIIA
2007
Springer
15 years 8 months ago
A Tree Kernel-Based Shallow Semantic Parser for Thematic Role Extraction
We present a simple, two-steps supervised strategy for the identification and classification of thematic roles in natural language texts. We employ no external source of informat...
Daniele Pighin, Alessandro Moschitti