Sciweavers

1243 search results - page 157 / 249
» More efficient predictive control
Sort
View
130
Voted
IJACT
2008
101views more  IJACT 2008»
15 years 3 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
128
Voted
JCM
2006
86views more  JCM 2006»
15 years 3 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
JSCIC
2008
66views more  JSCIC 2008»
15 years 3 months ago
Mesh Redistribution Strategies and Finite Element Schemes for Hyperbolic Conservation Laws
In this work we consider a new class of Relaxation Finite Element schemes for Conservation Laws, with more stable behavior on the limit area of the relaxation parameter. Combine t...
Christos Arvanitis
132
Voted
CG
2005
Springer
15 years 3 months ago
Hyper-Resolution: Image detail reconstruction through parametric edges
Hyper-Resolution, a new technique for super-resolution reconstruction of images, is based on matching lowresolution target image details to their high-resolution counterparts from...
Lijun Yin, Matt T. Yourst
132
Voted
IVA
2010
Springer
15 years 2 months ago
Using Artificial Team Members for Team Training in Virtual Environments
In a good team, members do not only perform their individual task, they also coordinate their actions with other members of the team. Developing such team skills usually involves e...
Jurriaan van Diggelen, Tijmen Muller, Karel van de...