Sciweavers

2237 search results - page 312 / 448
» On the Security of Random Sources
Sort
View
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 4 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
ICRA
2006
IEEE
61views Robotics» more  ICRA 2006»
15 years 4 months ago
Simulated Odor Tracking in a Plane Normal to the Wind Direction
— A new strategy is developed for tracking an odor plume in an environment where wind is present. The strategy is inspired by the mechanisms that animals use to orient to stimuli...
Adam J. Rutkowski, Mark A. Willis, Roger D. Quinn
ISI
2005
Springer
15 years 3 months ago
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall
Intelligence analysts are flooded with massive amounts of data from a multitude of sources and in many formats. From this raw data they attempt to gain insight that will provide de...
Gregory J. Conti, Mustaque Ahamad, Robert Norback
EUROCRYPT
2008
Springer
14 years 11 months ago
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...
DI
2006
67views more  DI 2006»
14 years 10 months ago
A portable network forensic evidence collector
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Bruce J. Nikkel