Sciweavers

3765 search results - page 707 / 753
» Modelling Adaptive Web Applications
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
14 years 6 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
CDC
2010
IEEE
138views Control Systems» more  CDC 2010»
14 years 4 months ago
Sensor-based robot deployment algorithms
Abstract-- In robot deployment problems, the fundamental issue is to optimize a steady state performance measure that depends on the spatial configuration of a group of robots. For...
Jerome Le Ny, George J. Pappas
CORR
2011
Springer
181views Education» more  CORR 2011»
14 years 4 months ago
Lightweight Service Oriented Architecture for Pervasive Computing
Pervasive computing appears like a new computing era based on networks of objects and devices evolving in a real world, radically different from distributed computing, based on ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
TSP
2010
14 years 4 months ago
Tensor algebra and multidimensional harmonic retrieval in signal processing for MIMO radar
Detection and estimation problems in multiple-input multiple-output (MIMO) radar have recently drawn considerable interest in the signal processing community. Radar has long been a...
Dimitri Nion, Nicholas D. Sidiropoulos
AAAI
2012
13 years 3 days ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...