Sciweavers

16513 search results - page 3192 / 3303
» Numerical Analysis Methods
Sort
View
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
15 years 9 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
CIKM
2009
Springer
15 years 9 months ago
Helping editors choose better seed sets for entity set expansion
Sets of named entities are used heavily at commercial search engines such as Google, Yahoo and Bing. Acquiring sets of entities typically consists of combining semi-supervised exp...
Vishnu Vyas, Patrick Pantel, Eric Crestan
EFORENSICS
2009
Springer
15 years 9 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...
MODELS
2009
Springer
15 years 9 months ago
Language support for feature-oriented product line engineering
Product line engineering is an emerging paradigm of developing a family of products. While product line analysis and design mainly focus on reasoning about commonality and variabi...
Wonseok Chae, Matthias Blume
ROBOCUP
2009
Springer
128views Robotics» more  ROBOCUP 2009»
15 years 9 months ago
Sensor and Information Fusion Applied to a Robotic Soccer Team
This paper is focused on the sensor and information fusion techniques used by a robotic soccer team. Due to the fact that the sensor information is affected by noise, and taking in...
João Silva, Nuno Lau, João Rodrigues...
« Prev « First page 3192 / 3303 Last » Next »