Sciweavers

1131 search results - page 151 / 227
» Making Sense of Twitter
Sort
View
CRYPTO
2000
Springer
277views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications
The best known constructions for arrays with low bias are those from [1] and the exponential sum method based on the WeilCarlitz-Uchiyama bound. They all yield essentially the same...
Jürgen Bierbrauer, Holger Schellwat
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
15 years 8 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
161
Voted
DCOSS
2010
Springer
15 years 8 months ago
Approximate Distributed Kalman Filtering for Cooperative Multi-agent Localization
Abstract. We consider the problem of estimating the locations of mobile agents by fusing the measurements of displacements of the agents as well as relative position measurements b...
Prabir Barooah, Wm. Joshua Russell, João P....
AAAI
2008
15 years 7 months ago
Text Beautifier: An Affective-Text Tool to Tailor Written Text
We have spelling and grammar checking tools available on today's word processors. But what they are missing is a tool that can recommend several possibilities of a given writ...
Fahim Kawsar, Shaikh Mostafa Al Masum, Mitsuru Ish...
117
Voted
AAAI
2008
15 years 7 months ago
Mathematical Modeling and Convergence Analysis of Trail Formation
An ant deposits pheromone along the path that it travels and is more likely to choose a path with a higher concentration of pheromone. The sensing and dropping of pheromone makes ...
Sameena Shah, Ravi Kothari, Jayadeva, Suresh Chand...