Sciweavers

1116 search results - page 105 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
94
Voted
ICC
2009
IEEE
149views Communications» more  ICC 2009»
15 years 7 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
94
Voted
JIRS
2007
78views more  JIRS 2007»
15 years 17 days ago
Online-learning and Attention-based Approach to Obstacle Avoidance Using a Range Finder
The problem of developing local reactive obstacle-avoidance behaviors by a mobile robot through online real-time learning is considered. The robot operated in an unknown bounded 2...
Shuqing Zeng, Juyang Weng
110
Voted
KBSE
2007
IEEE
15 years 7 months ago
Using information retrieval to support design of incremental change of software
The proposed research defines an approach to combine Information Retrieval based analysis of the textual information embedded in software artifacts with program static and dynamic...
Denys Poshyvanyk, Andrian Marcus
103
Voted
AUTOMATICA
2005
155views more  AUTOMATICA 2005»
15 years 18 days ago
Identification of MIMO Hammerstein models using least squares support vector machines
This paper studies a method for the identification of Hammerstein models based on Least Squares Support Vector Machines (LS-SVMs). The technique allows for the determination of th...
Ivan Goethals, Kristiaan Pelckmans, Johan A. K. Su...
104
Voted
CORR
2008
Springer
138views Education» more  CORR 2008»
15 years 23 days ago
An Improved Robust Fuzzy Extractor
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W to agree on a secret key R in the presence of an active ...
Bhavana Kanukurthi, Leonid Reyzin