Sciweavers

4985 search results - page 271 / 997
» Observation of String-Rewriting Systems
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 4 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
IJRR
2008
114views more  IJRR 2008»
15 years 4 months ago
Active Electrolocation for Underwater Target Localization
We explore the capabilities of a robotic sensing system designed to locate objects underwater through active movement of an electric field emitter and sensor apparatus. The system ...
James R. Solberg, Kevin M. Lynch, Malcolm A. MacIv...
129
Voted
IVC
2000
173views more  IVC 2000»
15 years 4 months ago
A computational approach to color adaptation effects
The human vision system has adaptation mechanisms that cannot be managed with the classic tri-stimulus color theory. The effects of these mechanisms are clearly visible in some we...
Daniele Marini, Alessandro Rizzi
ICIP
2010
IEEE
15 years 2 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...
HICSS
2002
IEEE
76views Biometrics» more  HICSS 2002»
15 years 9 months ago
Software Requirements for Project-Based Learning - CommSy as an Exemplary Approach
Project teams have become an important element in teaching informatics. Web-based groupware systems are increasingly used in such educational settings. This kind of educational te...
Bernd Pape, Wolf-Gideon Bleek, Iver Jackewitz, Mic...